Uncategorized

Nord VPN

  The use of remote access technologies like RDP (Remote Desktop Protocol) and VPN (Virtual Private Network) has skyrocketed 41% and 33%, respectively, since the onset of the coronavirus (COVID-19) outbreak. The move comes as a large number of companies have asked staff to work from home, which usually entails connecting to internal intranets via remote access technologies like the two named above. Source: ZD Net

Read more
ransomware

If a layman pictures a cyberattack, the likelihood is they picture a ransomware attack: The screens overcome by a malicious message, locking up systems and demanding payment to a shadowy organisation or individual. This cultural ubiquity does not exist in a vacuum: Where other forms of cybercrime have gone in and out of fashion based on new attack techniques or changing defensive landscapes. Below, some of the most respected security professionals working today wax lyrical...

Read more
Face Mask

By Rita Selvaggi, CEO of ActivTrak The global reach of the coronavirus has elevated the discussion around the need for “social distancing” and working remotely to avoid spreading the infectious virus. Global companies like IBM, Goldman Sachs, and PwC are asking employees to work from home, as are smaller organisations, such as Seattle-based online payment company Stripe. As organisations consider having employees work from home on a more massive scale, it’s important to recognise that...

Read more

Threat actors are distributing the Dharma Ransomware in a new spam campaign targeting Windows users in Italy.  The Dharma Ransomware has been active for many years and is based on another ransomware family called Crysis. It is not common, though, to see this ransomware family distributed through malspam as it is more commonly installed via hacked remote desktop services. Source: Bleeping Computer

Read more
Stolen Health Data exposed by Maze ransomware

Recent reports have shown the hacking group behind Maze ransomware has been steadily posting the data of its victims online after the organizations fail to pay the ransom demand. A compiled list of victims shows the data of several healthcare organizations are included in those postings, despite a lack of public reporting of those incidents. Source: Health IT Security

Read more
Bulletproof Loro

Bulletproof has released its Annual Cybersecurity Industry Report that shows that half of the most pervasive of critical flaws - which offer hackers an easy route into an organisation – are down to outdated components, such as unpatched or unsupported software. However, this number has jumped significantly from 22%  over the previous year, indicating a widespread negligence when it comes to organisations’ cybersecurity practices. One of the most shocking findings was that cyber criminals continue to...

Read more
robot at computer

A word that has become synonymous with suspicious, illegal or unscrupulous online activity, it is hard to avoid bots being mentioned in one capacity or another in 2020. Now accounting for 50% of online traffic, bots and the legality of bots remains a misunderstood subject. Defined in layman’s terms as an automated tool that mimics human behaviour in order to generate a large amount of traffic, bots can be used for almost anything online, most...

Read more
Connections

by Nigel Stanley, CTO at TUV Rheinland Operational technology (OT) based solutions – where computerised systems control a physical output or detect a physical effect – have become an area of increased focus for cyber-attacks. This has now become a real concern for enterprises whose production systems, manufacturing plants, industrial control systems and processing infrastructure are under constant threat. Cyberattacks are a very real risk. Criminals have identified these OT systems as prime targets as...

Read more
Page 1 of 2 1 2