Mitigating Ransomware: A New Paradigm Shift
By CISO T.J. Minichillo Ransomware is a global epidemic from which no organization — small, medium or large — is immune. Cyber criminals launch a new ransomware attack every 11 seconds, regardless…
Russia-linked Nobelium APT targets orgs in the global IT supply chain
Russia-linked Nobelium APT group has breached at least 14 managed service providers (MSPs) and cloud service providers since May 2021. The SolarWinds security breach was not isolated, Russia-linked Nobelium APT group has…
NATO releases its first strategy for Artificial Intelligence
This week, NATO Defence Ministers released the first-ever strategy for Artificial Intelligence (AI) that encourages the use of AI in a responsible manner. Artificial Intelligence (AI) is changing the global…
Forensic Collections From a Mac: Challenges & Solutions
INTRODUCTION For law enforcement, finding and dealing with Apple devices in the field can create confusion and headaches without first understanding some critical differences between Operating systems (HFS+, APFS, and…
Protecting SMBs from Current Cybersecurity Threats
A Few Small Practices Can Have a Large Impact By Mike Mosher, Director of Technology, Cinch I.T. If you own a small or medium-sized business, you are a target of…
Making Sure the Lights Don’t Go Out
By Brett Raybould, EMEA Solutions Architect at Menlo Security The ransomware attack on Colonial Pipeline, the largest fuel pipeline in the US has shown just how vulnerable the energy industry…
Trustwave released a free decryptor for the BlackByte ransomware
Trustwave’s SpiderLabs researchers have released a free decryptor for the BlackByte ransomware that can allow victims to recover their files. Researchers from Trustwave’s SpiderLabs have released a decryptor that can…
Why NDR? See the Entire Elephant in the Room
By Aimei Wei, Chief Technical Officer (CTO) and Founder Network detection and response (NDR) has a long history, evolving out of network security and network traffic analysis (NTA). The historical…
Sinclair TV stations downtime allegedly caused by a ransomware attack
A ransomware attack is likely the cause of the recent downtime for TV stations owned by the Sinclair Broadcast Group broadcast television company. TV stations owned by the Sinclair Broadcast…
Trickbot spreads malware through new distribution channels
TrickBot operators are back and expand the distribution channels with partnership with cybercrime affiliates. The operators behind the infamous TrickBot (ITG23 and Wizard Spider) malware have resurfaced with new distribution…
Is the Edge Really Secure?
By Chetan Venkatesh, CEO and Co-Founder of Macrometa The simplest answer is… No. But, if history has taught security professionals anything it’s that the most secure network is the one…
Application Modernization and Other Best Practices of Securing Legacy Infrastructures
By Roman Davydov, Technology Observer, Itransition Legacy systems continue to play a vital role in the operations of many enterprises. However, over time, things like poor user adoption, increased maintenance…