Can Your Data Protection Software Recover from Modern Ransomware?

Your nightmare has come true. Your organization was just attacked by ransomware. They have crippled your networks, corrupted your Active Directory, encrypted business critical documents, and disabled production databases. Now the recovery clock starts… Continue reading Can Your Data Protection Software Recover from Modern Ransomware?

Privacy Takes a Hit In the High Court

One of the earliest “privacy” laws in the United States is, surprisingly, the Fair Credit Reporting Act. Back during the Nixon Administration, Congress passed a law that gave people the right to see what was on their credit report, to contest inaccura… Continue reading Privacy Takes a Hit In the High Court

Researchers Briefly Posted PoC for Windows Print Spooler RCE Flaw

File this under “Oops” (or maybe a stronger language equivalent) – for a brief period of time last month researchers at Sangfor published on GitHub a proof of concept (PoC) for a remote code execution (RCE) vulnerability affecting Windows Print Spoole… Continue reading Researchers Briefly Posted PoC for Windows Print Spooler RCE Flaw

LinkedIn Leaks 93% of Users’ Data—Refuses Blame for Breach

LinkedIn is fighting a crescendo of criticism over a huge data breach. But when is a breach not a “breach”?
The post LinkedIn Leaks 93% of Users’ Data—Refuses Blame for Breach appeared first on Security Boulevard.
Continue reading LinkedIn Leaks 93% of Users’ Data—Refuses Blame for Breach

The Network is Key to Securing the Everywhere Perimeter

In light of surging ransomware cases and recent high-profile cyberattacks like those on SolarWinds, Colonial Pipeline, and meat supplier JBS, enterprise security teams may fall into the trap of thinking, “more defenses are better.” They implement an a… Continue reading The Network is Key to Securing the Everywhere Perimeter

Can Managed Security Keep Businesses Safer?

In the last two decades, the cybersecurity industry has grown from a niche sector into a dominant force in the business world. Today, Gartner predicts that cybersecurity spending will reach $150 billion this year, almost double what was predicted in 2… Continue reading Can Managed Security Keep Businesses Safer?

Ransomware in Auto Manufacturing Threatens Industry’s Recovery

As automotive supply chains become more complex, automotive manufacturers are increasingly susceptible to a ransomware attack, according to a report from Black Kite. The security firm’s researchers analyzed the cybersecurity posture and ransomware sus… Continue reading Ransomware in Auto Manufacturing Threatens Industry’s Recovery

Menlo Security Poll Finds Resistance to Ransom Demands

A poll of 8,571 individuals conducted on Twitter by Menlo Security suggests business and IT leaders are becoming more inclined to accept financial losses rather than cave to ransomware demands. A full 79% of respondents said they would not pay ransom … Continue reading Menlo Security Poll Finds Resistance to Ransom Demands

REvil’s Linux Version Targets VMware ESXi Virtual Machines

Organizations running ESXi environments that thought they had somehow escaped the attention of REvil ransomware operators are in for a rude awakening – the ransomware-as-a-service’s repertoire now includes a Linux version aimed squarely at VMware ESXi… Continue reading REvil’s Linux Version Targets VMware ESXi Virtual Machines

Demystifying SSD Security

You left your laptop in a taxi or it was confiscated at a customs checkpoint. How do you ensure your personal or corporate data is safe? There are a number of best practices to follow. SSD Best Practices Step 1: Shut down your device in public spaces … Continue reading Demystifying SSD Security