Google Ordered to Provide Info on Alleged Cyber-bullies

Google Ordered to Provide Info on Alleged Cyber-bullies

A Canadian court has ordered American tech giant Google to disclose who has been operating a YouTube channel and a blog that have allegedly been used for cyber-bullying.  Wife and husband Sakura Saunders and Darius Mirshahi allege that whoever is behind the blog “Antifa: Exposed” and a YouTube channel they claim is linked to the blog, Undercoverkitty, has targeted them with insults and falsely accused both of them of being involved with a domestic terrorist organization.  The…

Read More

INTERPOL to Work with The Coalition Against Stalkerware to Tackle Surge in Tech Abuse

INTERPOL to Work with The Coalition Against Stalkerware to Tackle Surge in Tech Abuse

INTERPOL is set to join The Coalition Against Stalkerware, and will help advance the group’s efforts by educating the global law enforcement community on how to proactively investigate the use of stalkerware, as well as provide support to victims. The alliance was first set up in November 2019 to try and combat the use of stalkerware, a practice in which victims are monitored through their phone or computer. Initially compromised of 10 stakeholders, including Kaspersky,…

Read More

Payment Security in South Africa: A Discussion with Stakeholders

Payment Security in South Africa: A Discussion with Stakeholders

  The PCI SSC Security Summit of South Africa, an online event took place this week with more than 315 payment security practitioners from South Africa discussing the latest in payment security and standards. Here we talk with Jeremy King, PCI Security Standards Council VP Regional Head for Europe, Naniki Imelda Ramabi, Chief Risk Officer Payments Association of South Africa (PASA), and Sandro Bucchianeri, Group Chief Security Officer ABSA, about payment security trends, highlights from…

Read More

Patchstack Protects The Web With Community

Patchstack Protects The Web With Community

By Oliver Sild, the co-founder and CEO of Patchstack Web applications today are built with heavy use of open source code – all of which is largely put together by large communities of independent software developers. In fact, you can find open-source projects for almost everything. These communities behind open source are powerful. They maintain and develop software that many of us use on a daily basis. For example, WordPress.org is an open-source content management…

Read More

REvil ransomware – what you need to know about the criminal enterprise

REvil ransomware – what you need to know about the criminal enterprise

What is REvil? REvil is an ambitious criminal ransomware-as-a-service (RAAS) enterprise that first came to prominence in April 2019, following the demise of another ransomware gang GandCrab. The REvil group is also known sometimes by other names such as Sodin and Sodinokibi. There’s been plenty of ransomware before. What makes REvil so special? REvil has gained a reputation for attempting to extort far larger payments from its corporate victims than that typically seen in other…

Read More

The skills to propel your team’s cyber security defense

The skills to propel your team’s cyber security defense

By Andrew Loschmann, Chief Operating Officer, Field Effect Advancing your cyber security capabilities as you scale is an obvious need. But if you’re resourced like many infosec departments, either very lean or running solo, it’s always easier said than done. And as the pandemic throws more on your plate — there are often big expectations to meet, yet skilled talent and budget may be lacking. If you’re feeling like you’re wearing multiple hats, rushing from one emergency to the next, or…

Read More

DoJ Launches Ransomware Taskforce as Apple Hit by Extortion Attempt

DoJ Launches Ransomware Taskforce as Apple Hit by Extortion Attempt

The US Department of Justice has reportedly launched a new ransomware task force, after an infamous threat group claimed to have stolen Apple trade secrets via a supplier. The REvil (Sodinokibi) group is reported to have posted a blog to its dark web-hosted naming and shaming site in which it claims to have compromised the network of Taiwanese supplier Quanta Computer. As the firm refused to pay the $50 million ransom, REvil is now putting the…

Read More

Security Biz Launches Breached RDP Site

Security Biz Launches Breached RDP Site

A threat prevention firm is claiming to have access to 1.3 million breached RDP servers and their credentials, which were put up for sale on a popular dark web site. New York-headquartered Advanced Intelligence is offering a new free service enabling concerned organizations to check if their RDP servers were part of the trove. Ultimate Anonymity Services (UAS) has been running for around five years on the dark web, specializing in providing access to RDP…

Read More

Prometei Botnet Exploits Exchange Server Bugs to Grow

Prometei Botnet Exploits Exchange Server Bugs to Grow

Security researchers have discovered that a persistent cryptocurrency mining botnet is exploiting still-unpatched Microsoft Exchange servers to grow globally. Dubbed “Prometei,” the botnet was first reported on in July 2020 and is thought to have been around since 2016, according to Cybereason Nocturnus. However, the research team found a new development in that the threat actors behind it have been exploiting Microsoft Exchange vulnerabilities CVE-2021-27065 and CVE-2021-26858 to penetrate victim networks, steal credentials and install…

Read More

Cloud Operating Model for Multi-Cloud – VMware Cloud Community

Cloud Operating Model for Multi-Cloud – VMware Cloud Community

In the previous blog post about multi-cloud we talked about multi-cloud and what the impact it has to the I&O organization. And for most I&O organizations it is a journey to move from traditional IT management to a cloud operating model for multiple clouds. In this blog post we will look into the evolution of cloud over time. We’ll dive into the two evolutionary steps that most enterprises go through in their cloud journey. Cloud…

Read More
1 2,392 2,393 2,394 2,395 2,396 2,658