A Queen’s Ransom: Varonis Uncovers Fast-Spreading “SaveTheQueen” Ransomware
During our investigation, we found that the attacker used the SYSVOL share on the customer’s domain controller to help spread the malware and track infections. The attacker had likely obtained and used domain admin privileges to write files to SYSVOL.
Facebook is Most Imitated Brand for Phishing Attempts: Check Point Research’s Q4 2019 Brand Phishing Report
This report highlights the brands which were most frequently imitated by criminals in their attempts to steal individuals’ personal information or payment credentials during Q4, which includes the busiest online shopping periods of the year.
What’s New in Security and Compliance for Webex (Cisco)
While Cisco Webex offers frictionless end-user experiences through modern collaboration, our 360 approach to security provides unmatched control, privacy, and compliance to meet the requirements of IT and security teams.
FBI warns about ongoing attacks against software supply chain companies
"Software supply chain companies are believed to be targeted in order to gain access to the victim's strategic partners and/or customers, including entities supporting Industrial Control Systems (ICS) for global energy generation, transmission, and distribution," the FBI said in a private industry notification.
Mac malware threats are now outpacing attacks on Windows PCs
In 2019, the average number of “detections” per Mac was 11, compared to an average of 4.8 in 2018. Windows users saw an average of 5.8 detections during the same 12-month period.
Game Theory in Real-Life Partnerships
Gotham Technology Group’s CTO, Ken Phelan, explains how an understanding of game theory can help business partnerships prosper – or flounder.
SOC It 2 Me: CyberArk Achieves SOC 2 Type 2 Compliance
As we continue to bolster and enhance our best-in-breed Privileged Access Management (PAM) as a Service portfolio, we are proud to announce that CyberArk recently attained SOC 2 Type 2 compliance for both Endpoint Privilege Manager and CyberArk Privilege Cloud.
Citrix Among Top Work Coordination Platforms
Citrix is among the top platforms companies can use to unify everything they need to be productive into one seamless, intuitive experience. The company today announced that it has been named to the 2020 Constellation ShortList™ for Work Coordination Platforms.
January 2020’s Most Wanted Malware: Coronavirus-themed Spam Spreads Emotet Malware (Check Point)
The Check Point research team reported that Emotet was the leading malware threat for the fourth month running, and was being spread during the month using a Coronavirus-themed spam campaign.
U.S. Data Breaches Rose in 2019, but Many Details Remain in the Shadows (ProofPoint)
The total number of data breaches rose 17% year over year, leading the ITRC to categorize 2018’s drop as a “blip.”
5 Ransomware Trends to Watch in 2020 (Recorded Future)
If organizations do everything correctly in their response to a ransomware attack, they could still be on the hook to pay the attacker hundreds of thousands of dollars or risk their sensitive data being leaked (or pay hundreds of thousands of dollars and still have their sensitive data leaked).