The Ragnar Locker ransomware operation has been threatening to dump victims' stolen data if they contact police, private investigators or professional negotiators before paying a ransom. But as one expert notes: "Perhaps the criminals watched too many TV shows, because this isn’t how the real world works."
Rapid7 has acquired Velociraptor, an open-source endpoint-monitoring organization and community that will continue to operate as a stand-alone entity while the security firm adopts some of its technology. Meanwhile, Zscaler had announced a deal to buy Trustdome.
View this webinar as McAfee Chief Technology Officer Steve Grobman, and McAfee Enterprise Architect and Principal Engineer, Mo Cashman share all they currently understand and advise on the evolving SolarWinds Supply Chain and SUNBURST Backdoor threat.
Are insurers getting cold feet over covering losses to ransomware? With claims due to ransomware skyrocketing, some insurers have reportedly been revising offerings to make it tougher for companies to claim for some types of cybercrime, including extortion.
A hacking group targeting Iranian dissidents has developed malware that can bypass two-factor authentication protection on Android devices to steal passwords, according to Check Point Research. The hackers have also targeted victims' Telegram accounts.
The level of risk associated with each of the threats described in this report depends on your organization's systems and security posture. While that is something only you can assess, this report provides insights and actionable recommendations to help you protect your networks.
Download this report to find out how: A single-site proof-of-concept quickly led to a full roll-out across 36 power stations; trust power gained visibility and dramatically improved their security posture and the rugged solution empowered the company to monitor its operational environments.
Synopsys is a Leader in Gartner's Magic Quadrant for Application Security Testing (AST) for the fourth year in a row. Based on their ability to execute and their completeness of vision, they are positioned hightest and furthest right in the leaders Quadrant.
Download the full report to learn more:
8 Steps to Shore Up Your Defense Against Cyberattack
In the past, it was easy to take mainframe security for granted. The mainframe was locked down behind closed doors, and even if you were able to get into the room, you'd still needed the coding experience to hack it.
Today, the mainframe is closer to the internet...
Southeast Asia has become a hotbed for cybercrime activities, says Anthony Bargar, former deputy CISO of the U.S. Department of Defense, who says enterprises in the region need to take a collaborative defense approach to respond to this new threat environment.
The increasing use of internet-connected devices in manufacturing facilities is opening up new ways for hackers to target so-called "smart" factories with unconventional attack methods, according to an analysis by security firm Trend Micro and the Polytechnic University of Milan.
With most employees working at home during the COVID-19 pandemic, it's more important than ever for businesses to ensure that their third-party providers have adequate business continuity plans in place to ensure uninterrupted service, says Srilanka-based Sujit Christy, global CISO at John Keells Holdings.
Connected IoT devices are expected to reach more than 75 billion by 2025. Because of that, reducing cyber risk is increasingly becoming a critical focal point for network and security professionals.
Download the IoT eBook to learn more about:
The new risks posed by consumer-grade IoT devices
What makes detecting compromised devices so difficult? The risk of a breach is higher than ever, with countless examples ending up in the news. So how do we detect these infected endpoints faster?
This guide seeks to answer this question and explore the obstacles in identifying infections.
SOC-as-a-service has rapidly become the preferred approach to detect and respond to advanced threats that bypass your existing controls. This white paper explains why, and underscores the differences between SOC-as-a-service, MDR, MSSP and SIEM.
Download the white paper and learn why:
Cloud-based security services...