International Malware Takedown Seized 100+ Servers

International Malware Takedown Seized 100+ Servers

An international coalition of police organized by the European Union’s justice and police agencies has revealed an ongoing operation against malware droppers that Europol calls the “largest ever operation” of its kind. Called “Operation Endgame,” the ongoing initiative targets malware delivery “droppers” and “loaders,” and is an attempt to disrupt large-scale malware deployments. Between May 27 and May 29, police arrested four people, seized more than 100 servers and took control of more than 2,000…

Read More

What Is ShrinkLocker? New Ransomware Targets Microsoft BitLocker Encryption Feature

What Is ShrinkLocker? New Ransomware Targets Microsoft BitLocker Encryption Feature

A new strain of ransomware dubbed ShrinkLocker is being used by cyberattackers to target enterprise computers. It exploits the Microsoft BitLocker encryption feature to encrypt the entire local drive and remove the recovery options before shutting down the PC. ShrinkLocker was discovered by cybersecurity firm Kaspersky, and analysts have observed variants in Mexico, Indonesia and Jordan. BitLocker has been used to stage ransomware attacks in the past, but this strain has “previously unreported features to…

Read More

Retail Tech Deep-Dive: Meraki Security

Retail Tech Deep-Dive: Meraki Security

Join us as we dive deeper into Cisco and Cisco partner technology deployed at the Cisco Store! We asked Chris Weber (Senior Product Manager, Meraki MX security and SD-WAN) and Imran Idrees (Senior Product Marketing Manager, Cisco security and SD-WAN) to discuss how Cisco Meraki security allows businesses to stay ahead of the latest threats while reducing both cost and complexity.   How does Cisco Meraki security improve a retailer’s and shopper’s in-store and/or virtual…

Read More

Top 5 Cloud Trends U.K. Businesses Should Watch in 2024

Top 5 Cloud Trends U.K. Businesses Should Watch in 2024

As business data demands increase, cloud providers and their customers find themselves having to consider the implications of increasing storage costs, security risks and environmental footprint. Such impacts are of particular importance to U.K. organisations, as it is the largest cloud market in Europe. TechRepublic spoke to U.K. cloud experts to identify the top five industry trends emerging from the country’s burgeoning reliance on the fundamental IT infrastructure. These cloud trends are: Premiumisation of cloud packages….

Read More

Finding My Place, Part Three: Translating Military Skills to Cybersecurity Leadership

Finding My Place, Part Three: Translating Military Skills to Cybersecurity Leadership

When I left the military, I had some big misconceptions. I thought jumping into a leadership position at a big company like Cisco would be a breeze. I had already led Marines into conflict zones, so how hard could it be? But, after being turned down several times for leadership positions at several different companies, I had to rethink my strategy. It turned out that I had a lot to learn about the business world, especially the business…

Read More

Get 9 Courses on Ethical Hacking for Just $50

Get 9 Courses on Ethical Hacking for Just

TL;DR: Kickstart a lucrative ethical hacking career or protect your own business with The Complete 2024 Penetration Testing & Ethical Hacking Certification Training Bundle, now just $49.99. Ethical hackers are in high demand all over the world, in all kinds of industries. If you’re interested in pursuing this promising career path or saving money by protecting your own business, The Complete 2024 Penetration Testing & Ethical Hacking Certification Training Bundle can help. Although incident response…

Read More

How Can Businesses Defend Themselves Against Cyberthreats?

How Can Businesses Defend Themselves Against Cyberthreats?

Today, all businesses are at risk of cyberattack, and that risk is constantly growing. Digital transformations are resulting in more sensitive and valuable data being moved onto online systems capable of exploitation, thus increasing the profitability of a successful breach. Furthermore, launching a cyberattack is becoming more accessible. Exploit kits and malware-as-a-service offerings are getting cheaper, while open-source AI tools are making masquerading as a trusted executive and exploiting vulnerabilities easier. TechRepublic consolidated expert advice…

Read More

Accelerating SaaS security certifications to maximize market access

Accelerating SaaS security certifications to maximize market access

The regulatory landscape for Software-as-a-Service (SaaS) offerings is rapidly changing worldwide as governments seek to address concerns around privacy, security, and data sovereignty. While the European Union’s Cybersecurity Certification Scheme for Cloud Services (EUCS) has set a high standard for data protection, Asian countries are also stepping up their regulatory frameworks. For instance, the Information System Security Management and Assessment Program (ISMAP) in Japan provides a baseline standard of protection for user data, imposing stringent…

Read More

Top 5 Global Cyber Security Trends of 2023, According to Google Report

Top 5 Global Cyber Security Trends of 2023, According to Google Report

It is taking less time for organisations to detect attackers in their environment, a report by Mandiant Consulting, a part of Google Cloud, has found. This suggests that companies are strengthening their security posture. The M-Trends 2024 report also highlighted that the top targeted industries of 2023 were financial services, business and professional services, tech, retail and hospitality, healthcare and government. This aligns with the fact that 52% of attackers were primarily motivated by financial…

Read More

U.K. and U.S. Warn of Pro-Russia Hacktivist Attacks on Operational Technology Systems

U.K. and U.S. Warn of Pro-Russia Hacktivist Attacks on Operational Technology Systems

The U.K.’s National Cyber Security Centre (NCSC) and other international cyber authorities, including the Federal Bureau of Investigation (FBI), have warned about pro-Russia hacktivist attacks targeting providers of operational technology. OT is hardware and software that interacts with the physical environment and includes smart water metres, automated irrigation systems, dam monitoring systems, smart grids and IoT sensors for precision agriculture. In the alert published on May 1, the cyber authorities provide advice to OT providers…

Read More
1 6 7 8 9 10 15