Beware of GermanWiper – the ransomware that is not ransomware

A piece of wiper malware is making the rounds erasing people’s important files, with its authors demanding a modest ransom to restore the data. However, the ransomware campaign is a lie, and the operators have no intention of decrypting the data…. Continue reading Beware of GermanWiper – the ransomware that is not ransomware

Everything You Need to Know About Azure Infrastructure – July 2019 Edition


It may be the middle of Summer but there is a lot going on with Azure, this is what you need to know about Azure for the month of July.

The post Everything You Need to Know About Azure Infrastructure – July 2019 Edition appeared first on Petri.

Continue reading Everything You Need to Know About Azure Infrastructure – July 2019 Edition

Presidential text alerts are open to spoofing attacks, warn researchers

Researchers have shown that it’s technically possible for hackers to target the US Presidential text Alerts system to send fake messages. Continue reading Presidential text alerts are open to spoofing attacks, warn researchers

Radical Transparency: Killing Managed Security Services’ Black-Box Approach

Enterprises have been turning to managed security services for years and are losing faith with the “black box” approach that has become the industry standard. Organizations are requesting answers to what should be simple questions such as, What rules … Continue reading Radical Transparency: Killing Managed Security Services’ Black-Box Approach

U.S. Army, Towson University Aim to Advance Intrusion Detection

Researchers at the Army Research Lab (ARL) within the U.S. Army Combat Capabilities Development Command and Towson University are collaborating on an effort to make intrusion detection alerts more useful to cybersecurity teams by making it possible to … Continue reading U.S. Army, Towson University Aim to Advance Intrusion Detection

Enrich Your SIEM with Real-Time Event Contextualization

A sizable portion of security research has gone into creating security alerts that are effective at informing security analysts when certain events happen. For example: more than 50 failed SSH login attempts within 10 seconds from the same IP address … Continue reading Enrich Your SIEM with Real-Time Event Contextualization

Bitcoin Scammers Launch International Bomb Threat Hoax across US, Canada, Australia, New Zealand

An emailed bomb threat hoax sent Thursday afternoon has terrorized businesses and organizations across the US, Canada, Australia and New Zealand. Claiming to have planted bombs all over the building, the email demands ransom in bitcoin or the bombs wil… Continue reading Bitcoin Scammers Launch International Bomb Threat Hoax across US, Canada, Australia, New Zealand

Gigamon Acquires ICEBRG to Meld Security, Network Monitoring

Gigamon announced it is expanding the scope of its cybersecurity monitoring efforts significantly by acquiring ICEBRG, a provider of a cloud-based threat detection service. The combination of the sensors ICEBRG deploys coupled with the real-time netwo… Continue reading Gigamon Acquires ICEBRG to Meld Security, Network Monitoring

ZipperDown Programming Vulnerability Could Let Hackers Execute Code in iOS Apps

A recently discovered vulnerability in iOS applications could allow hackers to execute code within affected apps, provided the device is connected to an attacker-controlled Wi-Fi network. The number of potentially vulnerable applications is estimated a… Continue reading ZipperDown Programming Vulnerability Could Let Hackers Execute Code in iOS Apps

Next Generation Alerts Generally Available in Azure

This post will explain the improvements that Microsoft has made by making the next-generation alert system of Azure generally available.

The post Next Generation Alerts Generally Available in Azure appeared first on Petri.

Continue reading Next Generation Alerts Generally Available in Azure