Port of Houston was hit by an alleged state-sponsored attack
Last month, the Port of Houston, one of the major US ports, was hit by a cyber attack allegedly orchestrated by a nation-state actor. One of the major US ports,…
Jupyter infostealer continues to evolve and is distributed via MSI installers
Cybersecurity researchers spotted a new version of the Jupyter infostealer which is distributed via MSI installers. Cybersecurity researchers from Morphisec have spotted a new version of the Jupyter infostealer that…
AIOps Offers Security Teams an Early Warning System
By Ranjan Goel, Vice President, Product Management, LogicMonitor IT teams are under immense pressure to work faster than ever and deliver better results—at less cost. And they’re struggling to do…
5 Steps to Protect Your Organization from the Next Ransomware Attack
By Paul Kohler, CTO, S3 We have witnessed the largest ransomware attacks in history in the first half of 2021 alone. From SolarWinds to CNA Financial Corp, Colonial Pipeline, JBS…
US CISA, FBI, and NSA warn an escalation of Conti ransomware attacks
CISA, FBI, and the NSA warned today of an escalation of the attacks of the Conti ransomware gang targeting US organizations. CISA, the Federal Bureau of Investigation (FBI), and the…
Crystal Valley hit by ransomware attack, it is the second farming cooperative shut down in a week
Minnesota-based farming supply cooperative Crystal Valley was hit by a ransomware attack, it is the second attack against the agriculture business in a few days. Minnesota farming supply cooperative Crystal…
Europol arrested 106 fraudsters, members of a major crime ring
Europol, along with Italian and Spanish police, dismantled a major crime organization linked to the Italian Mafia that focuses on online frauds. Europol, along with law enforcement agencies in Italy…
Misconfigurations are the biggest threat to cloud security, period
By eSentire There is no doubt that cloud adoption is accelerating at an exponential rate. Whether it’s for business collaboration or to store critical data assets, organizations are increasingly relying…
Defeat Ransomware with Immutable Backup Data and Encryption
Move beyond traditional security strategies to protect against the two most common types of ransomware threats By Jon Toor, CMO, Cloudian The Director of the FBI recently described ransomware as…
The Biden administration plans to target exchange supporting ransomware operations with sanctions
US Government is expected to issue sanctions against crypto exchanges, wallets, and traders used by ransomware operations to cash out ransom payments. The Biden administration is putting in place all…
Cyber EO and Meeting Cloud Modernization Effort
By Stephen Kovac, Vice President of Global Government and Head of Corporate Compliance, Zscaler In wake of recent high profile attacks and an evolving hybrid work environment, agencies are working…
New CIOs: 5 Key Steps in Your First 100 Days
Getting the first 100 days right is critical to achieving momentum, credibility, and long-term success. By Etay Maor, Senior Director, Security Strategy, Cato Networks Starting off as a new CIO…