New Ransomware Spotted: White Rabbit and Its Evasion Tactics

New Ransomware Spotted: White Rabbit and Its Evasion Tactics

New Ransomware Spotted: White Rabbit and Its Evasion Tactics Ransomware We analyze the ransomware White Rabbit and bring into focus the familiar evasion tactics employed by this newcomer. By: Arianne Dela Cruz, Bren Matthew Ebriega, Don Ovid Ladores, Mary Yambao January 18, 2022 Read time:  ( words) We spotted the new ransomware family White Rabbit discretely making a name for itself by executing an attack on a local US bank in December 2021. This newcomer takes a page from Egregor, a more established ransomware family, in hiding its malicious activity and carries a potential connection to the advanced persistent…

Read More

Zero Trust is hard but worth it

Zero Trust is hard but worth it

At the end of last year, I heard from a long-time enterprise contact that had a major security concern. The company had installed three layers of security and just completed an audit. It showed that since thIey’d finished their installation they’d had five security incidents, and all of them had originated inside their security perimeter, bypassing most of their protection. Their question was what they did wrong and how they could fix it. What this…

Read More

Using the Linux look command to select lines from files

Using the Linux look command to select lines from files

The look command on Linux can be handy for selecting particular lines from text files with sorted contents. Let’s look into how it can be used and where you might run into some problems. Case sensitivity If you type a command such as “look unix”, you should see this: $ look unix UNIX Unix unix Notice that, because no file was specified in the command shown, look reverts to using the words file on the…

Read More

How to Protect All Five Stages of the IoT Security Lifecycle

How to Protect All Five Stages of the IoT Security Lifecycle

Smarter security for smart devices By Mitchell Bezzina, Senior Director, Product Marketing, Cloud-delivered Security Services, Palo Alto Networks The dependency on IoT devices to enable business, capture data, and facilitate communication is pervasive and continuing to evolve. While some of the most striking benefits of IoT revolve around business process efficiency, productivity, and cost reduction, an increasing number of enterprises are also recognizing IoT as an extraordinary source of intelligence with the ability to surface…

Read More

Arista Networks to Announce Q4 2021 Financial Results on Monday, February 14th 2022

Arista Networks to Announce Q4 2021 Financial Results on Monday, February 14th 2022

Announces participation in upcoming investor events SANTA CLARA, Calif.–(BUSINESS WIRE)– Arista Networks, Inc. (NYSE:ANET) will release its financial results for the quarter ended December 31st, 2021 after U.S. markets close on Monday, February 14th, 2022. The results will be included in a press release with accompanying financial information that will be posted on the Investor Relations section of the Arista website at https://investors.arista.com. Arista’s executive management team will host a conference call on February 14th,…

Read More

EHR Vendor Faces Legal Action Over Data Breach

EHR Vendor Faces Legal Action Over Data Breach

A Tennessee-based healthcare technology services company is facing legal action over a cyber-attack that occurred in August 2021. The class action lawsuit was filed against QRS Healthcare Solutions (QRS, Inc), an electric health record (EHR) vendor and provider of integrated practice management and clinical services, including electronic patient portals. On August 26 2021, QRS discovered that a cyber-attacker had accessed a QRS dedicated patient portal server on which certain sensitive information was stored. According to a data…

Read More

Nova Scotia Seeks to Improve Cyber-Bullying Law

Nova Scotia Seeks to Improve Cyber-Bullying Law

The government of Canadian province Nova Scotia is seeking public feedback on improving anti-cyber-bullying legislation enacted in July 2018. Nova Scotia was the first Canadian province to enact a detailed law addressing cyber-bullying and the unauthorized sharing of sexually explicit imagery. The law, known as the Intimate Images and Cyber-protection Act, was created to discourage individuals from bullying others via the internet, over email or through text messages. It further sought to dissuade people from sharing intimate…

Read More

Accellion Reaches $8.1m Data Breach Settlement

Accellion Reaches .1m Data Breach Settlement

Californian technology company Accellion Inc has reached an $8.1m settlement to resolve a legal claim relating to a data breach in December 2020. The class action lawsuit was filed on behalf of victims whose personal information was exposed during a cyber-attack on Accellion’s file transfer appliance (FTA). Accellion had been using the FTA for more than 20 years to securely share files deemed too sensitive or large to be sent over email. Before the cyber-attack occurred, Accellion actively…

Read More

Swiss transit authority uses AI monitoring to secure rails

Swiss transit authority uses AI monitoring to secure rails

Swiss transit authority uses AI monitoring to secure rails | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Doug Lucktaylor named Head of Information Security at CSS Assure

Doug Lucktaylor named Head of Information Security at CSS Assure

Doug Lucktaylor named Head of Information Security at CSS Assure | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 3,361 3,362 3,363 3,364 3,365 4,384