Return of the Darkside: Analysis of a Large-Scale Data Theft Campaign (Varonis)
The Darkside ransomware group announced their RaaS (Ransomware-as-a-Service) in August of 2020 via a “press release.” Since then, they have become known for their professional operations and large ransoms.
DataOps: Optimizing the Data Experience (Pure Storage)
As organizations embark on digital transformation initiatives, they need to identify business processes and related services that will perform better and be more consumable on a digital platform. Maintaining the information model and data model—and keeping them as optimized as possible—becomes paramount.
A Mystery Malware Stole 26 Million Passwords From Windows PCs
Researchers have discovered yet another massive trove of sensitive data, a dizzying 1.2 TB database containing login credentials, browser cookies, autofill data, and payment information extracted by malware that has yet to be identified.
Citrix recognized as a top DaaS solution by key IT media outlets
Citrix is proud to share that Citrix Virtual Apps and Desktops has been named the top-rated leader in desktops as a service (DaaS) solutions by three top IT media publications: IT Central Station, G2, and TechGenix.
Least Privilege in The Cloud (and Everywhere Else) (CyberArk)
In this era of security uncertainty, organizations are revisiting foundational practices like least privilege — when identities have their privileges and permissions restricted to bare minimum access — to mitigate risk and defend their growing cloud estates.
New CSPM Functionality Frees Teams from Alert Noise and Blind Spots (Palo Alto Networks)
By correlating multiple data points, including routing table configurations, Prisma Cloud is able to determine true network reachability, and then surface high fidelity alerts. This frees security teams from sifting through alert "noise" such as false exposure, so they can focus on more impactful security issues.
Navigating the Threat Landscape As Social Engineering Lures Change (Fortinet)
Now, as we once again shift work models in many countries, it is paramount to reconsider how these threats will affect the transition and how organizations can secure their networks.
Check Point Software is Cloud Security!
With the cloud native applications covered with our AppSec solution, this quarter we are announcing our unified solution for cloud workload protection. This is a solution which protects all applications, all APIs and every microservice that powers the application; containers, serverless functions and VMs.
Coffee Chat with Gotham & Arctic Wolf on June 22nd @ 9AM.
Arctic Wolf just released a new Managed Security Awareness offering and will be discussing how this can help ensure employees are regularly informed about threats and how to stop them at the point of attack.
Exclusive Ransomware Poll: 80% of Victims Don’t Pay Up
As ransomware attacks continue to grow in volume and sophistication – and not to mention profile, thanks to attacks like the one on Colonial Pipeline – organizations are becoming more aware of the risk. However, strategies for addressing ransomware turn out to be quite varied.
Announcing Proofpoint Information and Cloud Security Platform – Enabling DLP and SASE Use Cases
Together with Proofpoint SaaS Isolation, CASB Proxy provides granular access controls such as read-only access and real-time DLP for both approved and tolerated apps.
Characteristics of a Good Next-Generation Firewall (NGFW) (Check Point)
Today’s firewalls are multi-purpose network devices and key to any network; large or small, enterprise or small business, on-premises or virtual. In a properly segmented network, firewalls enforce zero trust least privileged access for users, groups, applications, systems and IoT devices.
Faux ‘DarkSide’ Gang Takes Aim at Global Energy, Food Sectors
Threat actors are taking advantage of the notoriety around the pipeline ransomware incident and the DarkSide name, in order to mount a fear-based social-engineering campaign.