Cybersecurity

Companies and Cybersecurity Services

Cyber criminals are getting smarter and strive to find new ways to sneak into a company’s information systems. Cyber security companies are turning to innovative solutions to combat those threats, in order to minimize cybercrimes.

Top news of the week: 23.11.2022.

#IoT
#healthIT
#ransomware
#cyberattacks
#Log4Shell
#infosec

@msuiche shared
On Nov 19, 2022
RT @AlexMartin: EXCLUSIVE: Ransomware incidents now make up the majority of the emergencies prompting the British government’s crisis management COBRA meetings. Half a dozen or so scoops in here on how little progress Westminster has made to tackle the issue. 🔽 https://t.co/L4FZ2maenF
Open
Ransomware incidents now make up majority of British government’s crisis management COBRA meetings

Ransomware incidents now make up majority of British government’s crisis management COBRA meetings

Ransomware incidents in the United Kingdom are now so impactful that the majority of the British government’s recent crisis management COBRA meetings have been convened in response to them ...

@threatintel shared
On Nov 18, 2022
Researchers crack Zeppelin ransomware keys https://t.co/BOueIMw4PM
Open
Researchers Quietly Cracked Zeppelin Ransomware Keys

Researchers Quietly Cracked Zeppelin Ransomware Keys

In a blog post published today to coincide with a Black Hat Dubai talk on their discoveries, James and co-author Joel Lathrop said they were motivated to crack Zeppelin after the …

@ITProToday shared
On Nov 21, 2022
CTOs Find Faith in Evolution of IT, but Compatibility Struggles Persist https://t.co/iOsoYrIBlI
Open
CTOs Find Faith in Evolution of IT, but Compatibility Struggles Persist

CTOs Find Faith in Evolution of IT, but Compatibility Struggles Persist

To best support the "New IT," CTOs must choose the right tech to create value, but they are finding compatibility to be a pain point.

@ISC2 shared
On Nov 18, 2022
Beware the BatLoader, The NSA calls for more memory safe programming language use and ransomware causes more trouble in Australia… Here are the latest threats and advisories for the week of November 18, 2022: https://t.co/YYdCOZtwEd https://t.co/nj2cwbIKSm
Open
Latest Cyberthreats and Advisories - November 18, 2022

Latest Cyberthreats and Advisories - November 18, 2022

Beware the BatLoader, the NSA calls for more memory-safe programming language use and ransomware causes more trouble in Australia….Here are the latest threats and advisories for the week of ...

@CyrilCoste shared
On Nov 17, 2022
RT @asokan_telecom: Are Your #IoT Devices Leaving Your Network Exposed: https://t.co/xqS1zjTElk @RLDI_Lamy @EvaSmartAI @Sharleneisenia @GersonRolim @BristowColin @segundoatdell @ChristianMcM @barbmaclean @GlenGilmore @jasonhenrichs @CyrilCoste
Open
Are Your IoT Devices Leaving Your Network Exposed?

Are Your IoT Devices Leaving Your Network Exposed?

For years, we’ve known that Internet of Things (IoT) devices can come under attack as quickly as within five minutes of being connected to the internet. The methods hackers used to exploit ...

@KateFazzini shared
On Nov 18, 2022
Great summary of this complex case h/T @brettel https://t.co/J4i2O2VDpI
Open
Kate Fazzini’s Post

Kate Fazzini’s Post

Great summary of this complex case h/T Brett Leatherman...

@SCMagazine shared
On Nov 18, 2022
A new joint alert details the spate of #cyberattacks and data extortion efforts of the Hive #ransomware group to support entities with identifying known IOCs and attack methods, with a particular focus on the health and public health sectors. #healthIT https://t.co/QfSUTHIlqj
Open
Feds warn of ongoing Hive ransomware threat, ‘especially healthcare’

Feds warn of ongoing Hive ransomware threat, ‘especially healthcare’

Hive ransomware actors have successfully exploited over 1,300 businesses globally since June 2021, earning about $100 million in payments. A joint alert shares IOCs and evasive measures, ...

@SCMagazine shared
On Nov 18, 2022
Iranian government-sponsored hackers infiltrated an unnamed US government agency’s network earlier this year, taking advantage of the #Log4Shell vulnerability to deploy crypto miners and compromise credentials, US cybersecurity officials said. #infosec https://t.co/zfUnYnsVeD
Open
Iranian compromise of federal network demonstrates enduring nature of Log4j

Iranian compromise of federal network demonstrates enduring nature of Log4j

Despite a federal order mandating that civilian agencies identify and patch all known instances of the vulnerability, experts say the disclosure of a federal agency compromised through ...