Hackers are Using Increasingly Sophisticated Methods of Cloaking Their Behavior When Breaching Networks
Hackers are Using Increasingly Sophisticated Methods of Cloaking Their Behavior When Breaching Networks
Security researcher Patrick Wardle has been looking at ways to generically detect ransomware attacks on Mac OS X systems and he has developed a tool that appears to be capable of accomplishing the task.
Zero-day exploits. SQL injection. Malware. There’s plenty to worry about as a security professional. But none of those attack vectors were part of the recent massive data leak at Panamanian law firm Mossack Fonseca.
A few months back, I was a passive observer to an interesting email thread. People on the thread were discussing a breach that was big news at the time. Suggestions were made as to why the breach occurred, how it may have occurred, how the response could have been better executed, among many other points. At one point in the discussion, one individual decided to interject the concept of cyber insurance in a mocking and condescending tone.
Crowdsourced security testing company Bugcrowd announced today that it has closed $15 million in a Series B funding round led by Blackbird Ventures. The new funding brings the total raised by the company to $24 million.
Threat protection firm FireEye this week launched a new service designed to help organizations manage the risks associated with corporate Mergers & Acquisitions (M&A).
The Electronic Frontier Foundation (EFF) filed a lawsuit on Tuesday against the U.S. Department of Justice in hopes of obtaining information on secret court orders requiring technology companies to decrypt their customers’ communications.
As if denying a user’s access to their files and asking for a $500 ransom to restore access wasn’t bad enough, the authors of a new piece of ransomware called CryptXXX decided to also pack their malware with information stealing capabilities.