Why do organizations need to prioritize ransomware preparedness?
Hitachi Vantara and Enterprise Strategy Group (ESG) announced the findings of a survey of more than 600 IT and cybersecurity professionals, which revealed that 79% respondents reported a ransomware attack at their company within the last year. More t.....»»
Qilin ransomware targets Google Chrome credentials
Sophos X-Ops reveals a new strategy that harvests credentials from compromised networks, raising significant cybersecurity concerns for organizations......»»
Miscategorization fuels discrimination within organizations and workplaces, say researcher
How does discrimination arise? A new paper by Muhammed Alperen Yasar, Ph.D. student at Ca' Foscari University of Venice and Paris I Pantheon-Sorbonne University offers valuable insights into the development of discriminatory behaviors in organization.....»»
How ransomware tactics are shifting, and what it means for your business
In this Help Net Security interview, Tim West, Director of Threat Intelligence and Outreach at WithSecure, discusses Ransomware-as-a-Service (RaaS) with a focus on how these cybercriminal operations are adapting to increased competition, shifting str.....»»
Veeam Software expands protection for Microsoft 365
Veeam Software announced Veeam Backup for Microsoft 365 v8, which delivers comprehensive and flexible immutability for Microsoft 365 data. Now organizations can ensure their Microsoft 365 data is resilient employing a zero-trust, multi-layered immuta.....»»
Simulation study explores how gift giving drives social change
New findings provide quantitative criteria for classifying social organizations in human history, together with potential explanatory variables that can be empirically measured for anthropology, history and archaeology, according to a study published.....»»
US Authorities Issue RansomHub Ransomware Alert
RansomHub spun out of the now defunct ALPHV......»»
New ransomware group is hitting VMware ESXi systems hard
Researchers spot a new ransomware actor called Cicada3301, but it's not linked to the game of the same name......»»
Voldemort espionage malware hits organizations across the globe
More than 70 companies were struck by malware that doesn't have a C2......»»
City of Columbus sues man after he discloses severity of ransomware attack
Mayor said data was unusable to criminals; researcher proved otherwise. Enlarge (credit: Getty Images) A judge in Ohio has issued a temporary restraining order against a security researcher who presented evidence that a.....»»
How RansomHub went from zero to 210 victims in six months
RansomHub, a ransomware-as-a-service (RaaS) outfit that “popped up” earlier this year, has already amassed at least 210 victims (that we know of). Its affiliates have hit government services, IT and communication companies, healthcare ins.....»»
A macro look at the most pressing cybersecurity risks
Forescout’s 2024H1 Threat Review is a new report that reviews the current state of vulnerabilities, threat actors, and ransomware attacks in the first half of 2024 and compares them to H1 2023. “Attackers are looking for any weak point to bre.....»»
Is authentic leadership effective in promoting diversity in Japan?
Promoting diversity in business organizations requires a focus on cognitive diversity, which is the differences in individuals' invisible attributes, such as knowledge, skills, perspectives, and values, rather than demographic diversity, such as age.....»»
Why ransomware attackers target Active Directory
Ransomware attacks have surged 78% year-over-year, affecting various sectors and organizations and significantly impacting supply chains. In this Help, Net Security video, Craig Birch, Technology Evangelist, and Principal Security Engineer at Cayosof.....»»
Pioneer Kitten: Iranian hackers partnering with ransomware affiliates
A group of Iranian hackers – dubbed Pioneer Kitten by cybersecurity researchers – is straddling the line between state-contracted cyber espionage group and initial access provider (and partner in crime) for affiliates of several ransomwar.....»»
Diligent NIS2 Compliance Toolkit helps organizations bolster their cybersecurity resilience
Diligent launched its Network and Information Security Directive (NIS2) Compliance Toolkit, designed to help organizations navigate the complexities of the European Union (EU) NIS2 Directive and bolster their cybersecurity resilience. The toolkit map.....»»
Dragos Platform updates streamline OT threat and vulnerability workflows
Dragos announced the latest release of the Dragos Platform, an OT network visibility and cybersecurity platform. The updates provide industrial and critical infrastructure organizations with even deeper and enriched visibility into all assets in thei.....»»
Critical Fortra FileCatalyst Workflow vulnerability patched (CVE-2024-6633)
Organizations using Fortra’s FileCatalyst Workflow are urged to upgrade their instances, so that attackers can’t access an internal HSQL database by exploiting known static credentials (CVE-2024-6633). “Once logged in to the HSQLDB,.....»»
HYCU for Microsoft Entra ID provides organizations with automated, policy-driven backups
HYCU announced significant updates to its HYCU R-Cloud data protection platform that offers customers additional protection for their Identity and Access Management (IAM) solutions with support for Microsoft Entra ID. With this announcement, customer.....»»
BlackByte affiliates use new encryptor and new TTPs
BlackByte, the ransomware-as-a-service gang believed to be one of Conti’s splinter groups, has (once again) created a new iteration of its encryptor. “Talos observed some differences in the recent BlackByte attacks. Most notably, encrypte.....»»
Lateral movement: Clearest sign of unfolding ransomware attack
44% of unfolding ransomware attacks were spotted during lateral movement, according to Barracuda Networks. 25% of incidents were detected when the attackers started writing or editing files, and 14% were unmasked by behavior that didn’t fit with kn.....»»