Month: February 2018

MicrosoftSecurity

How to mitigate rapid cyberattacks such as Petya and WannaCrypt

Credit to Author: Jenny Erie| Date: Wed, 21 Feb 2018 17:00:18 +0000

In the first blog post of this 3-part series, we introduced what rapid cyberattacks are and illustrated how rapid cyberattacks are different in terms of execution and outcome. In the second blog post, we provided some details on Petya and how it worked. In this final blog post, we will share: Microsofts roadmap of recommendations

Read more

Read More
ComputerWorldIndependent

Intel releases more Meltdown/Spectre firmware fixes, Microsoft feints an SP3 patch

Credit to Author: Woody Leonhard| Date: Wed, 21 Feb 2018 07:56:00 -0800

One month ago today, Intel told the world that their Meltdown/Spectre patches were a mess. Their advice read something like, “Ooopsie. Those extremely important BIOS/UEFI firmware updates we released a coupla weeks ago are causing Intel machines to drop like bungee cows. In spite of what we told you then, stop installing them now. And if you installed a bad BIOS/UEFI patch, well golly, contact your PC manufacturer to see if they know how to get you out of the mess.”

To read this article in full, please click here

Read More
MalwareBytesSecurity

How to build an incident response program: GDPR guidelines

Credit to Author: Paul Kincaid| Date: Wed, 21 Feb 2018 09:00:00 +0000

With the General Data Protection Regulation (GDPR) going into effect this May, many organizations need to have a robust incident response program to ensure the safety of their customers’ and employees’ data. Here’s part one of our guidelines.

Categories:

Tags:

(Read more…)

The post How to build an incident response program: GDPR guidelines appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Encryption 101: a malware analyst’s primer

Credit to Author: Vasilios Hioureas| Date: Tue, 20 Feb 2018 21:53:13 +0000

A primer on encryption mechanisms and how they are exploited by malware authors, including an introduction to encryption and the main methods used to encrypt ransomware.

Categories:

Tags:

(Read more…)

The post Encryption 101: a malware analyst’s primer appeared first on Malwarebytes Labs.

Read More