How to defend against human operated ransomware

How to defend against human operated ransomware

How to defend against human operated ransomware | 2021-03-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

SailPoint Appoints Heather Gantt-Evans as New CISO

SailPoint Appoints Heather Gantt-Evans as New CISO

Enterprise identity security firm SailPoint has appointed Heather Gantt-Evans as its new CISO. Gantt-Evans joins SailPoint from retail giant The Home Depot, where she served as the company’s senior director of security operations and resilience. Prior to The Home Depot, Gantt-Evans held various strategic security roles at Ernst & Young and Booz Allen Hamilton, along with spending six years as an all-source threat intelligence analyst in the US Army. Commenting on her appointment, Gantt-Evans said:…

Read More

Darkside 2.0 Ransomware Promises Fastest Ever Encryption Speeds

Darkside 2.0 Ransomware Promises Fastest Ever Encryption Speeds

Threat intelligence experts are warning of a new version of the Darkside ransomware variant which its creators claim will feature faster encryption speeds, VoIP calling and virtual machine targeting. Israeli outfit Kela shared with Infosecurity information posted by the Russian-speaking group to dark web forums XSS and Exploit. They claim that the Windows version of Darkside 2.0 encrypts files faster than any other ransomware-as-a-service (RaaS) and is twice as speedy as the previous iteration. This…

Read More

Encrypted Comms Firm Denies Police Cracked User Messages

Encrypted Comms Firm Denies Police Cracked User Messages

Encrypted communications platform Sky ECC has denied Europol claims that police have managed to access messages sent by criminals using the service. On Wednesday, the law enforcement organization claimed that police had been able to monitor the encrypted chats of 70,000 Sky ECC users, many of them having migrated from the notorious EncroChat platform used by organized crime gangs. It said investigators in Belgium, France and the Netherlands now had access to hundreds of millions…

Read More

Molson Coors Suffers Suspected Ransomware Attack

Molson Coors Suffers Suspected Ransomware Attack

Beverage giant Molson Coors has released details of what appears to be a ransomware incident. The firm, known for big-name brands such as Coors, Miller Lite and Foster’s, revealed the attack in a filing with the Securities and Exchange Commission (SEC) yesterday. It claimed the firm had experienced a “systems outage caused by a cybersecurity incident” which it was in the process of managing. “The company has engaged leading forensic information technology firms and legal…

Read More

“Hacker Games” Launched to Encourage Development of Secure Coding Skills

“Hacker Games” Launched to Encourage Development of Secure Coding Skills

App security testing firm Veracode has launched its inaugural Veracode Hacker Games, an event which aims to encourage the growth of secure coding skills. Taking place over two weeks from March 15-25 2021, computer science and cybersecurity teams from eight leading universities in the UK and US will be tested on their secure coding skills in a collegiate contest. A number of individual prizes will be on offer and Veracode will donate $10,000 and $5000 for…

Read More

The exposure in traditional executive protection

The exposure in traditional executive protection

The exposure in traditional executive protection | 2021-03-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Key considerations for contact tracing applications

Key considerations for contact tracing applications

Key considerations for contact tracing applications | 2021-03-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

How to install and configure 2FA on AlmaLinux

How to install and configure 2FA on AlmaLinux

Jack Wallen walks you through the process of enabling two-factor authentication on the new fork of CentOS, AlmaLinux. Image: iStock/natasaadzic In light of the CentOS kerfuffle (check out: Clearing up the CentOS Stream confusion), you might have opted to migrate your Linux servers to the new fork, AlmaLinux. If that’s the case, you’ve either found the process to be incredibly automatic or a bit of a challenge. Once you have AlmaLinux up and running, one…

Read More

School Boss Resigns After Porn Found on Computer

School Boss Resigns After Porn Found on Computer

An Arizona county school superintendent has resigned following the discovery of pornographic material on his work-issued computer, according to records obtained by The Associated Press. Coconino County announced the resignation of 67-year-old Tommy Lewis Jr. at the end of January 2021. At the time, the county said that Lewis was stepping down for personal reasons.  However, when questioned by the AP, a county spokesperson later confirmed that Lewis was under investigation for potential criminal activity. Lewis’ proclivity…

Read More
1 2,522 2,523 2,524 2,525 2,526 2,718