BlackMatter rises from the ashes of notorious cybercrime gangs

BlackMatter rises from the ashes of notorious cybercrime gangs

A new ransomware gang that calls itself BlackMatter has launched itself on the dark web, and is actively attempting to recruit criminal partners and affiliates to attack large organisations in the United States, UK, Canada, and Australia. As experts at Recorded Future describe, the BlackMatter gang is advertising for “initial access brokers” – individuals who can gain unauthorised access to enterprise networks, which can then be infected by ransomware. For such access, BlackMatter is prepared…

Read More

Introducing MVISION Cloud Firewall – Delivering Protection Across All Ports and Protocols

Introducing MVISION Cloud Firewall – Delivering Protection Across All Ports and Protocols

Architected for the cloud-first and remote-first deployments, MVISION Cloud Firewall secures access to applications and resources on the internet, accessed from every remote site and location, through a cloud-native service model. The solution inspects end-to-end user traffic – across all ports and protocols, enabling unified visibility and policy enforcement across the organizational footprint. Powered by McAfee Enterprise’s industry leading next-generation intrusion detection and prevention system, contextual policy engine and advanced threat detection platform, and supported…

Read More

COVID-19 changed our personal and business lives in ways we never imagined, especially on the technology front

COVID-19 changed our personal and business lives in ways we never imagined, especially on the technology front

COVID-19 changed our personal and business lives in ways we never imagined, especially on the technology front. Consumers started using online services at monumental rates, as evidenced by explosive growth across Amazon, Netflix, and on-demand delivery apps. Businesses accelerated the pace of digital transformation with never-before seen speeds, reflected in the meteoric rise of video conferencing, remote work, and cloud growth. Governments increased their use of websites and social media to keep citizens updated on…

Read More

How to attend Black Hat USA 2021 and DEF CON 29 virtually

How to attend Black Hat USA 2021 and DEF CON 29 virtually

DEF CON 29 sold out of virtual passes, so tuning in on Twitch and Discord are the best options for attending online this year. Hackers and security experts have virtual, in-person and hybrid options for attending Black Hat USA 2021 and DEF CON 29 this year. Organizers are expecting about 5,000 people at the joint in-person events in Las Vegas. There are still in-person and virtual tickets left for Black Hat but virtual tickets for…

Read More

Proofpoint Announces Second Quarter 2021 Financial Results | Proofpoint US

Proofpoint Announces Second Quarter 2021 Financial Results | Proofpoint US

Second Quarter Highlights Total revenue of $308.7 million, up 19% year-over-year Billings of $328.6 million, up 31% year-over-year GAAP EPS of $(0.92) per share, Non-GAAP EPS of $0.63 per share Operating cash flow of $60.9 million and free cash flow of $54.8 million SUNNYVALE, Calif., – July 29, 2021 – Proofpoint, Inc. (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced financial results for the second quarter ended June 30, 2021. “We were very…

Read More

Tenable Helps Organizations Disrupt Attacks with New Active Directory Security Readiness Checks

Tenable Helps Organizations Disrupt Attacks with New Active Directory Security Readiness Checks

In the wake of a growing number of both ransomware and sophisticated attacks, Tenable®, Inc., the Cyber Exposure company, has developed 10 foundational configuration checks for its solutions, including Tenable.io, Tenable.sc and both Nessus Professional and Nessus Essentials, that assess Microsoft Active Directory security readiness and align remediation efforts based on the threat landscape. These checks leverage Tenable’s expertise in securing Active Directory environments through Tenable.ad and are available immediately for existing customers at no…

Read More

“Real Estate for a Purpose”: Cisco unveils hybrid work plans and tech to support distributed teams

“Real Estate for a Purpose”: Cisco unveils hybrid work plans and tech to support distributed teams

After a year of WFH, companies are offering a mixed bag of flexible work arrangements. In the hybrid work era, the traditional office is getting a makeover to assist workers on-site and elsewhere. Image: GettyImages/Westend61 On Thursday, Cisco published two blog posts outlining its hybrid work strategy and company tech enabling distributed workforces. While the articles provide a specific glimpse into the strategy and approach for one tech titan, the underlying concepts of enabling remote…

Read More

VMware #1 in Worldwide IT Automation and Configuration for Fourth Consecutive Year by Global Analyst Firm

VMware #1 in Worldwide IT Automation and Configuration for Fourth Consecutive Year by Global Analyst Firm

News Detail PALO ALTO, Calif.–(BUSINESS WIRE)– VMware, Inc. (NYSE: VMW) today announced that leading analyst firm IDC ranked VMware No. 1 by market share in the worldwide IT automation and configuration management (ITACM) software market (1) for 2020. As the industry requirements for IT automation and configuration management software shift to optimize applications and infrastructure supporting digital … Thu, 29 Jul 2021 00:00:00 PALO ALTO, Calif.–(BUSINESS WIRE)– VMware, Inc. (NYSE: VMW) today announced that leading…

Read More

Phishing Attacks Often Target Small Businesses – Here’s What to Watch for

Phishing Attacks Often Target Small Businesses – Here’s What to Watch for

Scammers target businesses with phishing emails all the time, pretending to be legitimate customers or vendors asking for payment. While any company can be vulnerable to this type of attack, small- to medium-size companies are particularly vulnerable because it is easier for a scammer to do a bit of research online and identify the right people to impersonate or send a phishing email to. A quick social media search or a visit to a corporate…

Read More

Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems? | McAfee Blogs

Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems? | McAfee Blogs

Co-written with Northwave’s Noël Keijzer. Executive Summary For a long time, ransomware gangs were mostly focused on Microsoft Windows operating systems. Yes, we observed the occasional dedicated Unix or Linux based ransomware, but cross-platform ransomware was not happening yet. However, cybercriminals never sleep and in recent months we noticed that several ransomware gangs were experimenting with writing their binaries in the cross-platform language Golang (Go). Our worst fears were confirmed when Babuk announced on an…

Read More
1 2,229 2,230 2,231 2,232 2,233 2,649