How to be prepared for a ransomware attack: Check your data and backups

How to be prepared for a ransomware attack: Check your data and backups

Expert says ransomware attacks will happen, and your company has to be prepared long before the attack hits. TechRepublic’s Karen Roby spoke to Jim McGann, VP of Index Engines, about ransomware and how to recover from an attack. The following is an edited transcript of their conversation. Karen Roby: Jim, we talk about cybersecurity quite often, of course, but most people in mainstream America, they didn’t know what a ransomware attack even was until just…

Read More

Open XDR vs. SIEM

Open XDR vs. SIEM

Matching Resources and Business Risk with the Right Solution Gaining visibility and responding to attacks across the entire enterprise infrastructure (endpoints, servers, applications, SaaS, cloud, users, etc.) is a very tall order in today’s cybersecurity environment. Enterprises are forced to create complex security stacks consisting of SIEM, UEBA, SOAR, EDR, NDR, TIP and other tools in order to meet this challenge. For many enterprises, SIEM is the main tool for aggregating and analyzing data from…

Read More

French Teens on Trial for Cyber-bullying

French Teens on Trial for Cyber-bullying

France is trying more than a dozen teenagers in a new court set up in January specifically to hear cases concerning alleged online abuse and discrimination. If convicted in the landmark two-day trial, the thirteen young people could be given suspended prison sentences of up to three years.  The defendants are from a range of social and religious backgrounds. Charges levied against them include online harassment, making online death threats, and making online threats of rape.  Some…

Read More

Paving the way: Inspiring Women in Payments – A Q&A featuring Sherri Collis

Paving the way: Inspiring Women in Payments – A Q&A featuring Sherri Collis

  Sherri Collis spent most of her career as the lone female in the conference room, occupying roles more regularly filled by men. She was overlooked for training opportunities. She was passed up for promotions. But these experiences only fueled her drive to achieve success. In this edition of our blog, Sherri explains that, contrary to popular belief, women do not need to have 100% of the qualifications to do the job and still be…

Read More

NIST Publishes Ransomware Guidance

NIST Publishes Ransomware Guidance

The National Institute of Standards and Technology (NIST) has published new draft guidance for organizations concerning ransomware attacks.  The Cybersecurity Framework Profile for Ransomware Risk Management features advice on how to defend against the malware, what to do in the event of an attack, and how to recover from it.  NIST’s Ransomware Profile can be used by organizations that have already adopted the NIST Cybersecurity Framework and wish to improve their risk postures. It can also help…

Read More

Anomali Cyber Watch:  Klingon RAT Holding on for Dear Life, CVS Medical Records Breach, Black Kingdom Ransomware and More

Anomali Cyber Watch:  Klingon RAT Holding on for Dear Life, CVS Medical Records Breach, Black Kingdom Ransomware and More

The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: Black Kingdom, Darkside, Go, Klingon Rat, Microsoft PowerApps, Ransomware and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed….

Read More

SEC Probes SolarWinds Breach Disclosure Failures

SEC Probes SolarWinds Breach Disclosure Failures

The United States Securities and Exchange Commission (SEC) has launched a probe to determine whether some companies failed to disclose that they had been impacted by the 2020 hacking attack that compromised the SolarWinds Orion software supply chain. The assault on SolarWinds was discovered and disclosed by researchers at FireEye in December. The advanced persistent threat (APT) group behind the attack was able to compromise nine government agencies, critical infrastructure, and hundreds of private-sector organizations. Last month, SolarWinds CEO…

Read More

How a Business Email Compromise attack can threaten your organization

How a Business Email Compromise attack can threaten your organization

The most common type of BEC campaign involves a spoofed email account or website, according to GreatHorn. Image: iStock/OrnRin Email is one of the most popular tools exploited by cybercriminals to launch attacks against organizations. It’s quick and simple and it relies on social engineering to trick the recipient into falling for whatever scam is in play. One particular tactic favored by criminals is the Business Email Compromise (BEC) in which the scammer spoofs a…

Read More

Analyzing SonicWall’s Unsuccessful Fix for CVE-2020-5135

Analyzing SonicWall’s Unsuccessful Fix for CVE-2020-5135

Back in September 2020, I configured a SonicWall network security appliance to act as a VPN gateway between physical devices in my home lab and cloud resources on my Azure account. As I usually do with new devices on my network, I did some cursory security analysis of the product and it didn’t take long before I had identified what looked like a buffer overflow in response to an unauthenticated HTTP request. I quickly reported…

Read More
1 2,277 2,278 2,279 2,280 2,281 2,644