The US-CERT has pushed out an advisory yesterday to warn customers of a potential cyber attack following the heightened geopolitics. You will need to review the potential attack framework and the accompanying recommendations listed further down the advisory.
An application used by enterprises are utilized to deliver malware. Not any malware though, yes you guess it, ransomware! It is likely the same ransomware reported by Cisco Talos in April 2019. It is called REvil also known as “Sodinokibi.” Sodinokibi attempts to encrypt data in a user’s directory and delete shadow copy backups to
A must read article to get your head around this. As the article puts it, this stuff isn't vaporware dreams—it's real, it's here already, and it's changing your life whether you realize it or not.
Ransomware attacks are often seen as just nuisance when you have a good backup. However it is a disaster for many businesses when you have no fallback. Remember a ransomware is a monster with two heads. One, it denies you access your data. Two, what is often not talked about is the fact an intruder
Yes there has been yet another huge data breach. This time it is Capital One which according to Wikipedia “is a bank holding company specializing in credit cards, auto loans, banking and savings accounts headquartered in McLean, Virginia.” According to their statement posted on their website the person in question has been arrested. Rich Mogull
Security is a jigsaw. It has a lot of pieces (network security, email security, endpoint security etc) but to have the perfect fit, you have to align them correctly. You cannot replace a piece with a different piece even if you have more than one piece! If you are missing a piece you will always
The Japanese government has passed a new law which will allow them to access IoT devices in JApan with default username and password. In effect the National Institute of Information and Communications Technology (NICT) employee will attempt to login to some randomly selected 200 million devices. The issue is that people do not change the
Lets look into the basics of schedule scan also known as on-demand scan (this includes right-click scan). In the days when endpoint relied on anti-virus alone, schedule scan played a critical role in complementing the real-time scan also known as on-access scan. The real time scan is the guard on the tower overseeing anything that
The general public are waking up to the reality that password alone is not a long term solution. More and more people are opting in for a more secure way to safeguard their digital life by way of enabling two factor authentication (2FA) -also known as multi-factor authentication. Here is a good points to take
Bruce Schneier is a well known cryptographer, author and cyber security expert. Here is Bruce answering Reddit community’s questions in a “Ask Me Anything” style. If you ignore his book promotion mention, there are a lot of good and sometimes interesting questions he answered.