Phishing e-mails are more prevalent (and dangerous) than ever

Credit to Author: Steven J. Vaughan-Nichols| Date: Tue, 08 Mar 2022 08:56:00 -0800

Read more

Google buys cybersecurity company Mandiant for $5.4B

Credit to Author: Charlotte Trueman| Date: Tue, 08 Mar 2022 04:58:00 -0800

In a move to offer an end-to-end security operations suite from its cloud platform, Google has announced it will acquire cyberdefense and response company Mandiant for $5.4 billion, in a deal expected to close later this year.

The acquisition will complement Google Cloud’s existing security services and together, the companies will deliver a security operations suite as well as advisory services that help customers address critical security challenges and stay protected at every stage of the security lifecycle, Mandiant said in a press release.

The company recently announced a new Ransomware Defense Validation service for its SaaS-based XDR (extended detection and response) platform, Mandiant Advantage, to help enterprises gauge the ability of their security systems to guard against ransomware attacks. 

To read this article in full, please click here

Read more

Google buys cybersecurity company Mandiant for $5.4 billion

Credit to Author: Charlotte Trueman| Date: Tue, 08 Mar 2022 04:58:00 -0800

In a move to offer an end-to-end security operations suite from its cloud platform, Google has announced it will acquire cyberdefense and response company Mandiant for $5.4 billion, in a deal expected to close later this year.

The acquisition will complement Google Cloud’s existing security services and together, the companies will deliver a security operations suite as well as advisory services that help customers address critical security challenges and stay protected at every stage of the security lifecycle, Mandiant said in a press release.

The company recently announced a new Ransomware Defense Validation service for its SaaS-based XDR (extended detection and response) platform, Mandiant Advantage, to help enterprises gauge the ability of their security systems to guard against ransomware attacks. 

To read this article in full, please click here

Read more

Conti Ransomware Group Diaries, Part IV: Cryptocrime

Credit to Author: BrianKrebs| Date: Tue, 08 Mar 2022 01:38:36 +0000

Three stories here last week pored over several years’ worth of internal chat records stolen from the Conti ransomware group, the most profitable ransomware gang in operation today. The candid messages revealed how Conti evaded law enforcement and intelligence agencies, what it was like on a typical day at the Conti office, and how Conti secured the digital weaponry used in their attacks. This final post on the Conti conversations explores different schemes that Conti pursued to invest in and steal cryptocurrencies.

Read more

Change my password? AGAIN?

Credit to Author: Susan Bradley| Date: Mon, 07 Mar 2022 10:02:00 -0800

Every year at this time, I have to fill out my firm’s cyber insurance application — and every year they ask whether we encourage strong passwords and change them often. This question annoys me tremendously, because we really shouldn’t be changing passwords often. We should instead be choosing authentication processes that appropriately match site risks; using a password should be the last thing you want to rely on.

First, think about the information and data a website is keeping on you. The sites we want to offer the most protections often have the weakest. Where you can, always add two-factor authentication to a site’s access. (Not all multi-factor authentication is created equally, but some sort of multi-factor is better than none. If it encourages attackers to go elsewhere, it’s done its job.

To read this article in full, please click here

Read more

Conti Ransomware Group Diaries, Part III: Weaponry

Credit to Author: BrianKrebs| Date: Fri, 04 Mar 2022 20:20:29 +0000

Part I of this series examined newly-leaked internal chats from the Conti ransomware group, and how the crime gang dealt with its own internal breaches. Part II explored what it’s like to be an employee of Conti’s sprawling organization. Today’s Part III looks at how Conti abused a panoply of popular commercial security services to undermine the security of their targets, as well as how the team’s leaders strategized for the upper hand in ransom negotiations with victims.

Read more

Employee monitoring risks ‘spiraling out of control,’ union group warns

Credit to Author: Matthew Finnegan| Date: Fri, 04 Mar 2022 04:40:00 -0800

Read more

After Russia’s invasion of Ukraine, it's time to hunker down

Credit to Author: Steven J. Vaughan-Nichols| Date: Thu, 03 Mar 2022 10:46:00 -0800

Read more

It's time to secure the Apple enterprise

Credit to Author: Jonny Evans| Date: Thu, 03 Mar 2022 09:35:00 -0800

It’s not unreasonable to assume that war in Ukraine will generate a wave of cyberattacks. That means every business or personal computer user should audit their existing security protections, particularly for companies that have embraced the hybrid workplace.

While larger enterprises usually employ Chief Information Security Officers (CISOs) and security consultants to manage such tasks, what follows is useful advice for Mac, iPad, and iPhone users seeking to start such an audit.  

To read this article in full, please click here

Read more

Splunk appoints Gary Steele as new CEO

Credit to Author: Scott Carey| Date: Thu, 03 Mar 2022 03:12:00 -0800

Splunk has named Gary Steele as its new CEO, three months after the surprise resignation of longtime CEO Doug Merritt.

“The board is focused on identifying a leader with a proven track record of scaling operations and growing multi-billion-dollar enterprises,” Merritt said in a statement at the time.

We now know that leader is Gary Steele, who was the founding CEO of software-as-a-service (SaaS) security vendor Proofpoint, a company he led for nearly 20 years. During that time, Steele navigated both an IPO in 2012 and a private equity buyout from Thoma Bravo last year. He will start on April 11, when he will also take a seat on Splunk’s board.

To read this article in full, please click here

Read more