Palo Alto Networks Establishes World-Class Cybersecurity Consulting Group

Palo Alto Networks Establishes World-Class Cybersecurity Consulting Group

Wendi Whitmore leads new Unit 42 organization that combines threat intelligence and security consulting offerings SANTA CLARA, Calif., April 20, 2021 /PRNewswire/ — CORTEX SYMPHONY 2021 — Palo Alto Networks (NYSE: PANW) today announced it is establishing a new cybersecurity consulting group to help enterprises respond to emerging threats as they navigate an increase in costly, crippling cyberattacks. The newly expanded Unit 42 combines formerly Crypsis security consultants, who respond to 1,300+ incidents a year, with…

Read More

Multi-Cloud Podcast: VMware Cloud Foundation and the State of Cloud – VMware Cloud Community

Multi-Cloud Podcast: VMware Cloud Foundation and the State of Cloud – VMware Cloud Community

In our most recent podcast, Eric Nielsen (@ericnpro) and I (@djasso7494) sat down with Lee Caswell, VP of VMware’s Cloud Platform Business Unit.  Lee’s business unit is responsible for VMware Cloud Foundation, a complete cloud stack (compute, storage, networking and management) that runs in the datacenter, on the edge, on thousands of managed service provider partner environments and now on the hyper-scaler cloud environments of AWS, Azure, Google, IBM, Oracle and Alibaba. State of Cloud: …

Read More

Paving the way: Inspiring Women in Payments – A Q&A featuring Sarah Lambert

Paving the way: Inspiring Women in Payments – A Q&A featuring Sarah Lambert

  Sarah Lambert knows that exposure to technology at an early age can make all the difference in whether young pupils can see themselves in those professions. That’s why she has taken her passion for cybersecurity into local schools in Welwyn Garden City, England, enthusiastically encouraging students to consider all aspects of IT. In this edition of our blog, Sarah describes the wide variety of technological roles that have helped to shape her own career.

Read More

McAfee Provides Max Cyber Defense Capabilities in MITRE’s Carbanak+FIN7 ATT&CK® Evaluation | McAfee Blogs

McAfee Provides Max Cyber Defense Capabilities in MITRE’s Carbanak+FIN7 ATT&CK® Evaluation | McAfee Blogs

Each year, MITRE Engenuity™ conducts independent evaluations of cybersecurity products to help government and industry make better decisions to combat security threats and improve industry’s threat detection capabilities. These evaluations are based on MITRE ATT&CK®, which is widely recognized as the de facto framework for tracking adversarial tactics and techniques. At McAfee we know that cybercriminals are always evolving their tradecraft, and we are committed to providing blue teams (cyber defenders) the capabilities needed to win the game….

Read More

School District’s Files Leaked in $40m Ransomware Attack

School District’s Files Leaked in m Ransomware Attack

A South Florida school district that refused to pay its cyber-attackers a $40m ransom has had thousands of its files leaked online.  Broward County Public Schools was targeted by the Conti ransomware gang at the beginning of March in an attack that caused a shutdown of its computer system but left classes undisturbed.  Conti demanded that the sixth-largest school district in the United States hand $40m of its annual $4bn budget over to them.  In a transcript published by the gang, a negotiator…

Read More

Threat Actor Claims to Have Hacked Domino’s

Threat Actor Claims to Have Hacked Domino’s

A threat actor is claiming to have stolen the personal data of over a million customers of Domino’s Pizza. In an advert placed on the dark web, the alleged hacker says that they are selling 13 terabytes of data that they claim was stolen from the Indian branch of the American multinational pizza restaurant.  The illicit advertisement was discovered by Alon Gal, the co-founder and chief technology officer of Israel-based cybercrime intelligence firm Hudson Rock. Gal posted news…

Read More

Access Token Theft and Manipulation Attacks – A Door to Local Privilege Escalation | McAfee Blogs

Access Token Theft and Manipulation Attacks – A Door to Local Privilege Escalation | McAfee Blogs

Executive Summary Many malware attacks designed to inflict damage on a network are armed with lateral movement capabilities. Post initial infection, such malware would usually need to perform a higher privileged task or execute a privileged command on the compromised system to be able to further enumerate the infection targets and compromise more systems on the network. Consequently, at some point during its lateral movement activities, it would need to escalate its privileges using one…

Read More

Digital Divorce: Who Gets the Airline Miles and Music Files? | McAfee Blogs

Digital Divorce: Who Gets the Airline Miles and Music Files? | McAfee Blogs

Something you’ll want to know about all those movies, mp3s, eBooks, air miles, and hotel points you’ve accrued over the years: they’re digital assets that can factor into a divorce settlement.  Understandably, several factors determine the distribution of assets in a divorce. However, when it comes to dividing digital assets, divorce settlements and proceedings are charting new territory. The rate of digital innovation and adoption in recent years has filled our phones, tablets, and computers with all manner of digital assets. What’s more, there are also the funds sitting in our payment apps or possibly further monies…

Read More

Water After Oldsmar

Water After Oldsmar

How to Prevent the Next Attack on Our Water Infrastructure By Josh Cohen, Cyber Director, Economic and Trade Mission at the Embassy of Israel to the U.S. To get a preview of the next possible mass casualty terrorist attack, look no further than the Florida town of Oldsmar. In what was surely a Sum of All Fears  moment for Government officials, a cyber intruder of unknown origin attempted to poison Oldsmar’s water supply on February…

Read More
1 2,305 2,306 2,307 2,308 2,309 2,566