Report Highlights Rising Risks in Sensitive Data Management

Report Highlights Rising Risks in Sensitive Data Management

The volume of sensitive data that companies are harbouring in non-production environments, like development, testing, analytics, and AI/ML, is rising, according to a new report. Executives are also getting more concerned about protecting it — and feeding it into new AI products is not helping. The “Delphix 2024 State of Data Compliance and Security Report” found that 74% of organisations that handle sensitive data increased the volume kept in non-production, also known as lower, environments…

Read More

Ransomware Trends: Most Attacks Hit Between 1am and 5am, Study Finds

Ransomware Trends: Most Attacks Hit Between 1am and 5am, Study Finds

Threat actors are taking advantage of when security professionals are off-duty to stage their ransomware attacks, new research has found. The ThreatDown 2024 State of Ransomware report from Malwarebytes has revealed most incidents in the last year occurred between 1 a.m. and 5 a.m. The report’s authors used data from the ThreatDown Managed Detection and Response team to conduct their research. It found that global ransomware attacks increased by 33% in the last year, with…

Read More

RansomHub threat actors observed using EDR-killing tool

RansomHub threat actors observed using EDR-killing tool

Threat research from Sophos details a recent encounter with the ransomware group known as RansomHub. The research reports that the attack was unsuccessful; however, researchers were able to analyze the attack and discovered the use of an EDR-killing tool. The research has labelled this utility the EDRKillShifter.  John Bambenek, President at Bambenek Consulting, comments, “At present, only RansomHub is using the tool. However, as it was sold on the dark web, it is more than likely that…

Read More

Microsoft Says VMware ESXi Flaw is Being Exploited By Ransomware Groups

Microsoft Says VMware ESXi Flaw is Being Exploited By Ransomware Groups

A vulnerability in the ESXi hypervisor was patched by VMware last week, but Microsoft has revealed that it has already been exploited by ransomware groups to gain administrative permissions. VMware ESXi is a bare-metal hypervisor that enables the creation and management of virtual machines directly on server hardware, which may include critical servers. CVE-2024-37085 is an authentication bypass vulnerability that allows malicious actors with sufficient permissions to gain full access to a domain-joined ESXi host….

Read More

Australian Organisations Experiencing Highest Rate of Data Breaches, Reports Rubrik

Australian Organisations Experiencing Highest Rate of Data Breaches, Reports Rubrik

Australian organisations have reported the highest rate of data breaches compared with global markets in 2023, according to a new survey. However, they were less likely than their global peers to experience a “significant” cyber attack. Australia’s quicker adoption of technologies, including cloud computing, is part of the story, according to backup and recovery firm Rubrik. The company has urged Australian organisations to review their backups to improve cyber resilience. Approximately 8 in 10 Australian…

Read More

Ransomware Attacks Are Attracting Record Payouts in Australia. Should You Pay the Ransom?

Ransomware Attacks Are Attracting Record Payouts in Australia. Should You Pay the Ransom?

Ransomware remains one of the most common forms of cyber attack — and it’s particularly threatening because it can be incredibly effective. Globally, ransomware damage costs are predicted to exceed $265 billion by 2031. These attacks can affect even the largest of organisations. In July, a hacking group disrupted more than 230 of Indonesia’s government agencies and services by infecting critical systems at a national data centre. Why organisations are tempted to pay ransoms Theoretically,…

Read More

Cyber Security Public-Private Partnerships Are Taking Off in APAC

Cyber Security Public-Private Partnerships Are Taking Off in APAC

APAC governments are partnering more closely with private-sector organisations and cyber security tech providers as part of public-private partnership style arrangements. These collaborations can include threat intelligence sharing, cyber capacity building, research and joint investigations. As the cyber threat continues to grow in APAC, including from ransomware attackers and nation-state actors, the hope is that integrated collaboration between governments and businesses will lead to a more cohesive response. What is a cyber security public-private partnership?…

Read More

Locking out ransomware: A new way to look at security strategy

Locking out ransomware: A new way to look at security strategy

Ransomware attacks are accelerating at a record pace, becoming dramatically more frequent and more sophisticated. In fact, nearly 60% of companies experienced ransomware events in the last year, forcing desperate businesses to cough up a staggering $1 billion in ransom payments. That’s up from the $220 million that was paid to bad actors in 2019. Change Healthcare is just one recent example. The company was hit with one of the largest ransomware attacks within healthcare,…

Read More

Cisco Talos: Top Ransomware TTPs Exposed

Cisco Talos: Top Ransomware TTPs Exposed

Cisco Talos analyzed the top 14 ransomware groups between 2023 and 2024 to expose their attack chain and highlight interesting Tactics,Techniques and Protocols. The security company also exposed the most leveraged vulnerabilities being triggered by ransomware actors. Ransomware attack chain: What Cisco Talos researchers learned Ransomware actors nearly all use the same attack chain. Typical ransomware attack chain. Image: Cisco Talos Step one for ransomware actors The first step for the threat actor consists of…

Read More

Dragos: Industrial Cyber Security Basics Can Help Protect APAC OT Operators

Dragos: Industrial Cyber Security Basics Can Help Protect APAC OT Operators

Industrial cyber security in APAC is still lagging behind enterprises, but having some basic hygiene and a plan in place is “light years” better than nothing, according to director of incident response at operational technology cyber security firm Dragos Lesley Carhart. Carhart recommends industrial technology operators large or small in APAC realise they could all be targets, including from state actors looking to steal information or position themselves for a future geopolitical event, and to…

Read More
1 2 3 4 41