Category: Uncategorized

New Phishing Attack Delivers Three Types Of Malware To Victims

Phishing campaigns get more effective the more closely they can imitate a trusted source.  Recently, security researchers at Fortinet discovered evidence of a phishing campaign that specifically targets Microsoft Windows users and …http://dlvr.it/SRrHbZ

Maximizing Opportunities to Stop Ransomware Attacks

Chet Wisniewski of Sophos on Latest Research Findings As the dwell time between when hackers compromise a system and when they trigger a ransomware attack has grown, victims have a little more precious time to detect and stop these attacks “before the worst happens,” says Chet Wisniewski, principal research scientist at Sophos.http://dlvr.it/SRr2YX

How Do You Migrate PAM to the Cloud?

Peter Gankin of Takeda Shares His Company’s Journey What are some challenges of shifting on-premises PAM to the cloud, and how should one go about it? Peter Gankin, head of identity and access management at Takeda, a Japanese multinational pharmaceutical company, shares his views.http://dlvr.it/SRqFzt

Microsoft Warns New Sysrv Botnet Variant Is Dangerous

Security researchers employed by Microsoft have recently spotted a variant of the Sysrv botnet.  They have dubbed the new variant Sysrv-K. This new variant works in two ways.  First, it exploits a …http://dlvr.it/SRnL21

Russian Ministry of Construction Website Hacked

ICYMI: Hacker Demands Ransom; Ministry Says Personal Data of Users Secure The website of the Russian Ministry of Construction, Housing and Utilities was reportedly hacked and defaced on Sunday. The attacker demands a 1-million-ruble ransom be paid by Tuesday to ensure the security of stolen data. A ministry spokesperson told a state news agency that…
Read more

Government Agencies Seize Domains Used to Sell Credentials

ICYMI: DOJ: Now-Shuttered Site Sold Data Obtained From 10,000 Data Breaches The U.S. Department of Justice and FBI announced the seizure of three domains after an investigation that found these domains selling stolen personal information and providing access to conduct distributed denial-of-service attacks. The domain includes weleakinfo.to, ipstress.in and ovh-booter.com.http://dlvr.it/SRmTzM

Forescout to Buy Threat Detection and Response Vendor Cysiv

ICYMI: Cysiv’s Cloud-Native Data Analytics Will Help OT and IoT Customers Address Threats Forescout has agreed to purchase startup Cysiv to help OT and IoT customers analyze, detect and respond to threats using cloud-native data analytics. The proposed acquisition will make it easier for customers to mine and cross-reference data that’s stored on Forescout’s platform.http://dlvr.it/SRmL5f

You Might Need This HP Bios Security Update

HP recently released a BIOS update to address a pair of high-severity vulnerabilities that affect a wide range of PC and notebook products offered by the company.  In both cases, the vulnerabilities …http://dlvr.it/SRk1N1