US DoJ indicted the CEO of Sky Global encrypted chat platform
The CEO of the encrypted communications firm Sky Global has been indicted in the US on charges of facilitating international drug trafficking The head of the Canada-based company Sky Global…
CMMC – Lessons Learned to Date
By Carter Schoenberg, Vice President of Cybersecurity at SoundWay Consulting. In the January issue of Cyber Defense Magazine, my first article provided an introduction to the Cybersecurity Maturity Model Certification…
3 SaaS Backup Rules to Keep Your Data Safer in 2021
By Dmitry Dontov, CEO and Chief Architect of Spin Technology In the wake of the global pandemic, organizations of all types and sizes have pivoted to cloud resources to accommodate…
REvil Ransomware gang uses DDoS attacks and voice calls to make pressure on the victims
The REvil ransomware operators are using DDoS attacks and voice calls to journalists and victim’s business partners to force victims to pay the ransom. The REvil/Sodinokibi ransomware operators announced that…
Gootkit delivery platform Gootloader used to deliver additional payloads
The Javascript-based infection framework for the Gootkit RAT was enhanced to deliver a wider variety of malware, including ransomware. Experts from Sophos documented the evolution of the “Gootloader,” the framework used…
Does Sunburst Have Your Confidential Emails and Database Data?
By Randy Reiter CEO of Don’t Be Breached So far three malware strains have been identified in the SolarWinds supply chain attack. They are the SUNBURST, SUPERNOVA, and TEARDROP malware…
Channeling as A Challenge
By Milica D. Djekic Abstract: The modern cyber systems could deal with some kinds of information leakage concerns such as source, routing, and destination data losses. Any of them can…
Gmail users from US most targeted by email-based phishing and malware
Google revealed that Gmail users from the United States are the most targeted by email-based phishing and malware. A joint five-month study conducted by Google with Stanford University researchers analyzed…
Vulnerability Patching: Why Does It Fall Short So Often?
Weak threat insight, SecOps competing priorities, and fear of making things worse are key reasons By Chris Goettl, Director of Security Product Management, Ivanti It isn’t glamorous. It won’t guarantee…
Data Risk, Intelligence and Insider Threats
When it comes to securing networks in today’s business environment, the single biggest challenge firms must contend with is that of the insider threat. While the term is typically associated…
CD Projekt Red game maker discloses ransomware attack
The gaming firm CD Projekt Red, which developed popular games like Cyberpunk 2077 and The Witcher, has disclosed a ransomware attack. The gaming firm CD Projekt Red, which developed popular…
Cyberattacks On K-12 Education
Carefully allocating limited resources lets districts get the best bang for the buck. By Saryu Nayyar, CEO, Gurucul While we read about a lot of high profile cyberattacks against large…