The operators behind the Ryuk strain of malware are increasingly relying on a malware-as-a-service tool - the Buer loader - to deliver the malware, rather than botnets such as Trickbot and Emotet, the security firm Sophos reports.
So far, much of the discussion about 5G security has focused on avoiding the use of technology from Chinese manufacturers, including Huawei and ZTE. But security experts are increasingly concerned that 5G network and device providers rushing products to market aren't devoting enough attention to security.
Security Orchestration for Dummies discusses the basics of security orchestration, its underlying needs, implementation best practices, popular use cases and major trends that are driving future growth.
Inside this e-book, you will:
Study enterprise security challenges;
Define security orchestration;
Security orchestration connects different security tools, teams and infrastructures for process-based security operations and incident response. The user-driven nature of security orchestration has resulted in the deployment of varied and interesting use cases.
This whitepaper will discuss:
SOAR solutions are steadily gaining traction in real-world use to improve security operations. Security and risk management leaders should evaluate how these solutions can support and optimize their broader security operations capabilities.
Download this whitepaper to read more about some of the key...
A greatly enhanced variant of the powerful Mirai botnet is already infecting IoT devices even though it's operating in a test environment, according to researchers at cybersecurity firm Avira Protection Lab.
"Cybercrime is an evolution, not a revolution," says Europol's Philipp Amann, who oversees the EU law enforcement intelligence agency's annual study of the latest cyber-enabled crime trends. Ransomware, social engineering and the criminal abuse of cryptocurrency and encryption are some of the top threats.
The operators behind the LockBit ransomware strain use automation tools and techniques that help the malware quickly spread through a compromised network and also assist in picking specific targets, according to Sophos.
Dr. Reddy's Laboratories, a multinational pharmaceutical company based in India that's testing a COVID-19 vaccine, says it isolated its data center services Thursday following what it calls a "detected cyberattack."
An indictment unsealed this week demonstrates the degree to which Western intelligence agencies have apparently been able to infiltrate the Russian intelligence apparatus to trace attacks back to specific agencies - and individual operators. Shouldn't Russian spies have better operational security?
When it comes to a breach and exposed data, a digital risk protection solution represents a way to gain visibility into your organization's exposure across the open, deep and dark webs, helping to reduce the risks of potential external threats. This e-book outlines the essential elements and use cases of a mature and...
This survey of over 300 senior security decision makers and influencers across midsize and large financial services firms in the US, UK and DACH provides insights on:
Secure Access tool usage and value;
The degree of confidence respondents have in their ability to mitigate risks;
How financial services plan to...
Understand potential risks in your cluster, and the best practices for securing sensitive workloads
The most important things to keep in mind when you host sensitive workloads on Kubernetes
How to understand potential risks in your cluster
Access control variabilities, and security monitoring and auditing...
VMware Carbon Black is out with its latest Global Incident Response Threat Report, which describes "the perfect storm" for increasingly sophisticated attacks heading into 2021. Cybersecurity strategist Tom Kellermann discusses what that means - and how these trends should inform our defensive strategies.