Unwrapping the Mystery: Did a Big, Slimy Internet Worm Make Hundreds of Organizations WannaCry?

IBM X-Force revealed that WannaCry spread to its targets like a computer worm. But unlike a classic worm, it carried a malicious payload of ransomware.

The post Unwrapping the Mystery: Did a Big, Slimy Internet Worm Make Hundreds of Organizations WannaCry? appeared first on Security Intelligence.

Continue reading Unwrapping the Mystery: Did a Big, Slimy Internet Worm Make Hundreds of Organizations WannaCry?

Tanium raises $100 million investment, raises value to $3.75 billion

Private cybersecurity company Tanium announced Thursday it raised $100 million in funding, led by the private equity firm TPG, raising the company’s valuation to $3.75 billion. The company, which sells endpoint protection and management to government and military agencies as well as most of the top banks and retailers in the United States, had $300 million in cash and investments plus over 100 percent revenue growth before the latest injection of money. Earlier this week, Tanium hired Chris Bream, a director of product security at Facebook, as their new Chief Technology Officer. The raise comes despite the latest controversy for the California-based company: Tanium was found to be using real-time data from a hospital network in sales demos. Company CEO Orion Hindawi admitted mistakes were made, but the data was from the customer’s demo environment. Additionally, nine senior executives have the left the company over the last eight months, according to an […]

The post Tanium raises $100 million investment, raises value to $3.75 billion appeared first on Cyberscoop.

Continue reading Tanium raises $100 million investment, raises value to $3.75 billion

Russian Postal Service Hit by WannaCry Ransomware Attack

By Ali Raza

WannaCry ransomware attack has left a devastating trail on half of the world and this also includes the Russia’s postal service which was recently targeted and successfully infected by the malware. Some of the service’s computers are still not operational. This is one of the biggest signs of weakness when it comes to Russia’s online defenses […]

This is a post from HackRead.com Read the original post: Russian Postal Service Hit by WannaCry Ransomware Attack

Continue reading Russian Postal Service Hit by WannaCry Ransomware Attack

Incident Response: Planning for the Attack Before It Happens

An effective backup strategy is simply one part of a larger security and incident response plan, which should be developed proactively.

The post Incident Response: Planning for the Attack Before It Happens appeared first on Security Intelligence.

Continue reading Incident Response: Planning for the Attack Before It Happens

Is it possible to recover wannacry encrypted files through file system recovery?

As I saw wannacry encrypts files and then removes them, I thought it is possible to recover some of the original files by file system recovery using a bootable OS.

Is it possible to use a bootable recovery OS to recover wann… Continue reading Is it possible to recover wannacry encrypted files through file system recovery?

386 WannaCry Ransomware and 26 EternalRocks Samples Discovered

By Waqas

Have you heard the expression “it ain’t over till it’s over”? Well, it matches with the ongoing situation of WannaCry ransomware attacks as researchers from TrustLook, a cyber security company have collected 386 new samples of WannaCry ransomware. WannaCry is a wicked encryption based malware (aka ransomware) which used Server Message Block protocol (SMB) vulnerability in Windows […]

This is a post from HackRead.com Read the original post: 386 WannaCry Ransomware and 26 EternalRocks Samples Discovered

Continue reading 386 WannaCry Ransomware and 26 EternalRocks Samples Discovered

Stopping Threats in Their Tracks With Proactive Monitoring

An effective response to an advanced threat such as WannaCry can be broken down into two phases: vulnerability management and proactive monitoring.

The post Stopping Threats in Their Tracks With Proactive Monitoring appeared first on Security Intelligence.

Continue reading Stopping Threats in Their Tracks With Proactive Monitoring