Transportation Companies Hit by Cyberattacks Using Lumma Stealer and NetSupport Malware

Transportation Companies Hit by Cyberattacks Using Lumma Stealer and NetSupport Malware

Sep 25, 2024Ravie LakshmananEmail Security / Threat Intelligence Transportation and logistics companies in North America are the target of a new phishing campaign that delivers a variety of information stealers and remote access trojans (RATs). The activity cluster, per Proofpoint, makes use of compromised legitimate email accounts belonging to transportation and shipping companies so as to inject malicious content into existing email conversations. As many as 15 breached email accounts have been identified as used…

Read More

Build Your Network Skills With the Network Fundamentals Bundle for Only $40

Build Your Network Skills With the Network Fundamentals Bundle for Only

TL;DR: The 2024 Network Fundamentals Bundle has 36 hours of learning content and is on sale for just $39.99 (reg. $179) for a limited time. In our hyper-connected world, network security skills are unsurprisingly in high demand. Whether you’re an aspiring network administrator, ethical hacker, or IT professional, mastering the fundamentals of networking is essential to building a successful career. That’s where the 2024 Network Fundamentals Bundle can be of great use. It’s also on…

Read More

Analytics at the source: A distributed approach to network security

Analytics at the source: A distributed approach to network security

Network visibility and Network Detection and Response (NDR) solutions are deployed to collect, view and analyze network activity to detect suspicious and malicious activity on the network. The majority of these solutions are built to move data from a collection point (or sensor) to a central repository for analysis. This approach has several downsides including issues of scale, performance, cost and accuracy (false positives). All of these problems can be overcome by solutions that perform…

Read More

Product spotlight on cybersecurity

Product spotlight on cybersecurity

Cybersecurity is a constant priority for business as new threats emerge each day. Security magazine highlights a variety of cybersecurity products to protect data and businesses. BEAZLEY Quickly Detect and Respond to Threats Beazley Security’s Managed eXtended Detection and Response (MXDR) service combines human intelligence with advanced technologies and external data sources to provide clients around-the-clock protections. The MXDR provides total transparency to cyber operations, and uncomplicated endpoint-based pricing that includes unlimited data ingestion and long-term retention…

Read More

Locking out ransomware: A new way to look at security strategy

Locking out ransomware: A new way to look at security strategy

Ransomware attacks are accelerating at a record pace, becoming dramatically more frequent and more sophisticated. In fact, nearly 60% of companies experienced ransomware events in the last year, forcing desperate businesses to cough up a staggering $1 billion in ransom payments. That’s up from the $220 million that was paid to bad actors in 2019. Change Healthcare is just one recent example. The company was hit with one of the largest ransomware attacks within healthcare,…

Read More

New APT Group

New APT Group

Jul 08, 2024NewsroomCyber Espionage / Cloud Security A previously undocumented advanced persistent threat (APT) group dubbed CloudSorcerer has been observed targeting Russian government entities by leveraging cloud services for command-and-control (C2) and data exfiltration. Cybersecurity firm Kaspersky, which discovered the activity in May 2024, said the tradecraft adopted by the threat actor bears similarities with that of CloudWizard, but pointed out the differences in the malware source code. The attacks wield an innovative data-gathering program…

Read More

Enhancing Your Network Security Growth: New Partner Offers

Enhancing Your Network Security Growth: New Partner Offers

Network security is the foundation of a customers’ security posture. Having a firewall that can adapt to your customers’ changing needs is essential to protecting their network. Cisco, a leader in networking and cybersecurity solutions, understands this need and has introduced a range of new security incentives and promotions to maximize your profitability when selling Cisco Firewalls. The new programs are designed to be simple for you to leverage as you help businesses of all…

Read More

Empowering remote healthcare workers: A collaborative approach

Empowering remote healthcare workers: A collaborative approach

Healthcare organizations are increasingly adopting remote work as a permanent strategy. In this new era, robust cybersecurity is critical. This article delves into strategies healthcare organizations can implement to empower their remote workforce and protect sensitive patient and corporate data. Understanding shared security responsibility With remote employees now relying on IT resources beyond the control of healthcare organizations, the concept of shared security responsibility becomes paramount. It’s not just about organizations securing as much of…

Read More

Security Cloud Control: Pioneering the Future of Security Management

Security Cloud Control: Pioneering the Future of Security Management

Organizations face a critical challenge today: attackers are exploiting the weakest links in their networks, such as unsecured users, devices, and workloads. This threat landscape is complicated by the shift from traditional data centers to a distributed environment, where protecting dispersed data across multiple touchpoints becomes complex. To address these threats, many organizations resort to using multiple security tools, leading to siloed teams, tech stacks, and management systems that hinder effective security. This fragmented approach…

Read More

How Your Business Can Benefit from a Network Security Policy | TechRepublic

How Your Business Can Benefit from a Network Security Policy | TechRepublic

With the increasing complexity of cyberthreats and data breaches, companies must deploy robust measures to protect their networks. This is why a network security policy must be in place to create security guidelines for devices that transport and store company data. An introduction to network security Every company’s network is made up of devices that transmit and store information. This can include internal and external systems, either company-owned or leased. To protect company data and…

Read More
1 2 3 4 10