Eastern European cybercrime is evolving, and some of the latest trends defy conventional wisdom. Moscow-based cybersecurity company Group-IB offers an analysis of some of these changes.
The identity of the individual or group behind the global WannaCry ransomware campaign remains unclear. But whoever wrote the ransom notes appears to have been fluent in Chinese and pretty good at written English, according to a linguistic analysis from security firm Flashpoint.
One of the most frustrating threat innovations of the last decade has been ransomware malware. Initially considered just a consumer threat, both government and commercial enterprise networks can now be listed among its victims.
In this Infographic, Forcepoint Security Labs examines the technical and business...
Every day, your employees - usually accidentally - create vulnerabilities that create opportunities for data breaches. You must balance risks with giving employees the access they need to succeed. While cloud apps and BYOD policies are known to increase user productivity & lower operating costs, they are also...
Organizations around the world are being targeted by ransomware attacks like never before...
But rather than suffer a data destruction or business disruption incident, many are paying the ransom. That's no solution. It's costly and comes with no guarantees of the safety of your data or systems. Perhaps worst of all,...
In the wake of WannaCry, there's a critical new flaw in Samba, which provides Windows-based file and print services for Unix and Linux systems. Security experts say the flaw is trivial to exploit. US-CERT recommends immediate patching or workarounds.
A number of media reports have recently suggested there's a "link" between WannaCry and the Lazarus hacking group, implying that North Korea authorized the ransomware campaign. But based on the evidence available so far, it's much too early to attribute the attacks to anyone.
The WannaCry ransomware outbreak showcases the problem: Security pros are overwhelmed by vulnerabilities that could be simple to mitigate, if only they had the right info at the right time. Humphrey Christian of Bay Dynamics discusses how to improve vulnerability risk management.
The topic arises not just because of...
The WannaCry ransomware outbreak was a huge "wake-up call" for the global information security community, says Dan Schiappa of Sophos. It's time to patch those legacy systems and prepare for the inevitable next big crimeware scare, he says.
A RedSeal-72Point study of 200 CEOs about their perceptions of cybersecurity posture discovered that many are dangerously unrealistic about how vulnerable they are. In fact, more than 80 percent displayed "cyber naiveté," allowing their organizations to be exposed to cyber-attack.
This study reveals the...
Good news for many victims of WannaCry: Free tools developed by a trio of French security researchers can be used to decrypt some PCs that were forcibly encrypted by the ransomware, if the prime numbers used to build the crypto keys remain in Windows memory.
WannaCry ransomware victims who haven't backed up their files have a tough choice: take a risk paying the ransom or just accept the loss. But there's a slim glimmer of hope: French researchers have figured out a way to decrypt files without paying, although their tools won't work for everyone.
Reports on how the U.S. Congress is taking steps to toughen cybersecurity lead the latest edition of the ISMG Security Report. Also, an analysis of a Government Accountability Office study on the IoT landscape and the security threats facing the internet of things.
Beyond improving their patch management practices, what else can organizations do to avoid falling victim to ransomware attacks such as WannaCry? Security expert Doug Copley offers advice.
Life after WannaCry: Already, other cybercrime gangs appear to be jumping on the SMB-targeting bandwagon, including the operators behind Uiwix ransomware. Thankfully, security experts say, these attacks pose scant risk.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.