-
Understanding the Ransomware Ecosystem: From Screen Lockers to Multimillion-Dollar Criminal Enterprise
PRIVACY PRIVACY A new report from Tenable Research explores the key players in the ransomware ecosystem and the tactics that have helped propel it from a fledgling cyberthreat into a force to be reckoned with. Ransomware is a constantly evolving cyberthreat, and it is through its evolution that ransomware has managed to not only survive,…
-
#Infosec22: Lessons Learned from Career on the Security Front Line
PRIVACY PRIVACY Developments in technology are making it harder for security services to gather intelligence or detect espionage, according to a former head of MI5 Read More
-
Symbiote Backdoor in Linux
PRIVACY PRIVACY Interesting: What makes Symbiote different from other Linux malware that we usually come across, is that it needs to infect other running processes to inflict damage on infected machines. Instead of being a standalone executable file that is run to infect a machine, it is a shared object (SO) library that is loaded…
-
Identity-Related Breaches Hit 84% of US Firms in 2021
PRIVACY PRIVACY Cloud adoption driving volume of corporate credentials Read More
-
How to Set Up a VPN
PRIVACY PRIVACY In today’s connected world, you can do so much on the internet. It’s never been easier to stay entertained (Netflix, anyone?), informed, and productive. But it’s important to keep your online activities private and safe, whether you’re checking social media, using a streaming service, or banking online. With the right solutions, you can…
-
How the Secure Software Factory Reference Architecture protects the software supply chain
PRIVACY PRIVACY The term “factory” related to software production might seem bizarre. Most still associate it with the collection, manipulation and manufacturing of hard materials such as steel, automobiles or consumer electronics. However, software is produced in a factory construct as well. “Software factory” generally refers to the collection of tools, assets and processes required…
-
How Microsoft Purview can help with ransomware regulatory compliance
PRIVACY PRIVACY Nations across the globe are taking regulatory action to reduce the ransomware threat. In March, for example, new U.S. ransomware reporting requirements were signed into law. Covered entities that experience a cyber incident must report it to the Cybersecurity and Infrastructure Security Agency (CISA) within 72 hours after the covered entity believes that…
-
Yodel Cyber Incident Disrupts UK Deliveries
PRIVACY PRIVACY Experts suspect ransomware as the cause Read More
-
Euro Cops Dismantle Multimillion-Dollar Phishing Gang
PRIVACY PRIVACY Europol trumpets Dutch and Belgian police work Read More
-
#InfosecurityEurope2022: Geopolitical Tensions a “Danger” to Cybersecurity
PRIVACY PRIVACY During a keynote talk, Mischa Glenny explained challenges geopolitical tensions create for cybersecurity Read More