Qlocker ransomware shuts shop after extorting owners of NAS drives

Qlocker ransomware shuts shop after extorting owners of NAS drives

With all the headlines about ransomware attacks hitting companies hard, you might think there’s only bad news around the subject. Well, think again. Not only has the Darkside ransomware gang seemingly shut down since the high-profile attack which resulted in the Colonial Pipeline being shut down, and numerous dark web forums announce that they will no longer promote ransomware-as-a-service (RAAS) schemes, but it also appears that another notorious ransomware outfit has decided to close its…

Read More

HMRC Investing Heavily in Cybersecurity Training for Staff, Official Figures Show

HMRC Investing Heavily in Cybersecurity Training for Staff, Official Figures Show

HM Revenue & Customs (HMRC) has spent over a quarter of a million pounds (£262,251) on cybersecurity training for its staff during the past two financial years, according to official figures obtained by the Parliament Street think tank following a Freedom of Information request. The UK’s tax authority spent £111,795 in the most recent financial year (20–21), which was a reduction on the £150,456 invested in 19–20. This funding covered 80 training enrollments in FY…

Read More

Microsoft and Google products hacked to launch cyberattacks

Microsoft and Google products hacked to launch cyberattacks

Just as business users have turned to cloud computing services and online collaboration software to do their jobs, so too have cybercriminals according to new research from Proofpoint. In recent months, the cybersecurity firm has observed a massive uptick in threat actors abusing Microsoft and Google’s infrastructure to host and send threats across Office 365, Azure, OneDrive, SharePoint, G-Suite and Firebase storage. In 2020, over 59m malicious messages were sent from Microsoft Office 365 targeting…

Read More

Proofpoint Introduces NexusAI for Compliance

Proofpoint Introduces NexusAI for Compliance

Proofpoint Introduces NexusAI for Compliance We store cookies on your computer to improve your experience and provide more personalized services, both on this website and on other sites. For more information about the cookies we use, see our Privacy Policy. We won’t track your information when you visit our site. We will have to use at least one cookie to ensure that you won’t have to make this choice again.AcceptDeclinePrivacy Policy Source…

Read More

Web App Bugs Drove Multiple Breaches Per Firm in 2020

Web App Bugs Drove Multiple Breaches Per Firm in 2020

Web application vulnerabilities enabled attackers to breach organizations on average twice each last year, with bot-based raids the biggest challenge, according to Barracuda Networks. The security vendor polled 750 application security decision makers to compile its latest report: The state of application security in 2021. It revealed that nearly three-quarters (72%) of firms suffered at least one breach from a web app flaw, a third (32%) were hit twice and 14% were compromised three times….

Read More

ARP funding to boost school safety, technology upgrades across the U.S.

ARP funding to boost school safety, technology upgrades across the U.S.

ARP funding to boost school safety, technology upgrades across the U.S. | 2021-05-20 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

The pandemonium of the pandemic: How working from home has changed the cybersecurity formula

The pandemonium of the pandemic: How working from home has changed the cybersecurity formula

The pandemonium of the pandemic: How working from home has changed the cybersecurity formula | 2021-05-20 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

To avoid insider threats, security strategies call for behavioral profiling and anomaly comparison

To avoid insider threats, security strategies call for behavioral profiling and anomaly comparison

To avoid insider threats, security strategies call for behavioral profiling and anomaly comparison | 2021-05-20 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

IT Network Attacks Can Impact Your OT Networks, Too

IT Network Attacks Can Impact Your OT Networks, Too

On May 8th, I was at a gas station filling up my car before a trip I was taking when the news about a cyberattack against a large pipeline company broke. The attack led them to halt all operations. Ultimately, the incident stemmed from a ransomware infection in which a well-known threat actor took volumes of corporate data in just two hours and made their demands including the threat to block and encrypt the company’s…

Read More

CloudHealth Secure State’s Playbook to Operationalize Cloud Security Posture Management – VMware Cloud Community

CloudHealth Secure State’s Playbook to Operationalize Cloud Security Posture Management – VMware Cloud Community

Four years ago, when CloudHealth Secure State founders were researching the cloud market, it was hard to ignore the growing list of companies that ended up in the news headlines due to simple misconfiguration mistakes leading to massive data breaches. A closer look revealed that the security teams in many of these companies had tools, but were struggling with cloud visibility. They were getting the security alerts but didn’t know where to focus their resources…

Read More
1 2,268 2,269 2,270 2,271 2,272 2,580