Credit to Author: Sally Adam| Date: Tue, 25 Jan 2022 13:00:20 +0000
Organizations with recent direct experience of a ransomware attack have considerably higher adoption of zero trust network access (ZTNA) technology than those that haven’t fallen victim.
Credit to Author: Eric Avena| Date: Tue, 17 Mar 2020 16:00:49 +0000
Secured-core PCs combine virtualization, operating system, and hardware and firmware protection. Along with Microsoft Defender ATP, Secured-core PCs provide end-to-end protection against advanced attacks that leverage driver vulnerabilities to gain kernel privileges.
Credit to Author: Eric Avena| Date: Thu, 05 Mar 2020 17:00:31 +0000
In human-operated ransomware attacks, adversaries exhibit extensive knowledge of systems administration and common network security misconfigurations, perform thorough reconnaissance, and adapt to what they discover in a compromised network.
Credit to Author: Priyanka Shinde| Date: Tue, 03 Mar 2020 09:54:12 +0000
All of us, at some point in time, must have heard the story of Wolf and the flock of sheep. The fooling trick used by the wicked wolf of pretending to be a sheep is still in use by many malware authors. They pretend to be genuine processes to achieve…
Credit to Author: Danny Bradbury| Date: Fri, 28 Feb 2020 12:04:27 +0000
Six alleged drug criminals will go free thanks to a ransomware attack on a small Florida city, it was revealed this month.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/-YH21vT56Rs” height=”1″ width=”1″ alt=””/>
Credit to Author: Trend Micro| Date: Tue, 25 Feb 2020 15:56:29 +0000
Variety is welcome in most walks of life, but not when it comes to the threat landscape. Yet that is unfortunately the reality facing modern cybersecurity professionals. As Trend Micro’s 2019 roundup report reveals, hackers have an unprecedented array of tools, techniques and procedures at their disposal today. With 52 billion unique threats detected by…
Credit to Author: BrianKrebs| Date: Mon, 24 Feb 2020 17:13:11 +0000
Networking hardware vendor Zyxel today released an update to fix a critical flaw in many of its network attached storage (NAS) devices that can be used to remotely commandeer them. The patch comes 12 days after KrebsOnSecurity alerted the company that precise instructions for exploiting the vulnerability were being sold for $20,000 in the cybercrime underground. Based in Taiwan, Zyxel Communications Corp. (a.k.a “ZyXEL”) is a maker of networking devices, including Wi-Fi routers, NAS products and hardware firewalls. The company has roughly 1,500 employees and boasts some 100 million devices deployed worldwide. While in many respects the class of vulnerability addressed in this story is depressingly common among Internet of Things (IoT) devices, the flaw is notable because it has attracted the interest of groups specializing in deploying ransomware at scale.
Credit to Author: Malwarebytes Labs| Date: Mon, 24 Feb 2020 16:32:34 +0000
A roundup of the previous week’s most notable security stories and events, including cloud identity management, a noteworthy Twitter scam-tastrophy, RobbinHood ransomware, and more.