Data Breach – Understanding the severity of it

Credit to Author: Akuti Ojah| Date: Wed, 15 Jul 2020 12:45:04 +0000

A data breach is a security gap in which information or data is accessed or stolen without authorization. It is a breach of trust between the owner of the data and the party that accesses it without consent. To put it in simpler terms it a nonconsensual usage of someone’s…

Read more

A week in security (June 8 – 14)

Credit to Author: Malwarebytes Labs| Date: Mon, 15 Jun 2020 15:30:00 +0000

A roundup of news and blog posts from the week of June 8 – 14, including the Honda ransomware attack, search hijackers, and what to look for in an RMM platform.

Categories:

Tags:

(Read more…)

The post A week in security (June 8 – 14) appeared first on Malwarebytes Labs.

Read more

Way Out of The MAZE: A Quick Guide For Defending Against Maze Ransomware

Credit to Author: Jayesh kulkarni| Date: Thu, 23 Apr 2020 09:18:21 +0000

From late 2019, MAZE Ransomware started becoming infamous for its Encryption, data stealing and the subsequent selling of the stolen data. Few other reasons behind its popularity are also its unique targets and the ransom demands. From its inception around May 2019, MAZE actors are targeting multiple sectors, prominent ones…

Read more

Security Breach Disrupts Fintech Firm Finastra

Credit to Author: BrianKrebs| Date: Fri, 20 Mar 2020 16:52:19 +0000

Finastra, a company that provides a range of technology solutions to banks worldwide, said it was shutting down key systems in response to a security breach discovered Friday morning. The company’s public statement and notice to customers does not mention the cause of the outage, but their response so far is straight out of the playbook for dealing with ransomware attacks.

Read more

Five steps to avoid a cloud data breach

Credit to Author: Sally Adam| Date: Fri, 21 Feb 2020 11:59:35 +0000

The recent MGM Resort hotels cloud server data breach highlights the need to secure sensitive data held in the public cloud.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/ifst-NkTXmQ” height=”1″ width=”1″ alt=””/>

Read more

Securing the MSP: why they’re their own worst enemy

Credit to Author: William Tsing| Date: Thu, 30 Jan 2020 16:00:00 +0000

Behind each cyberattack on the MSP is typically a system left unpatched, asset management undone, security officer not hired, or board who sees investment in security as a cost center rather than a long-term investment.

Categories:

Tags:

(Read more…)

The post Securing the MSP: why they’re their own worst enemy appeared first on Malwarebytes Labs.

Read more

A sloppy click can exfiltrate your important data!

Credit to Author: Anant Pulgam| Date: Mon, 03 Feb 2020 09:17:12 +0000

Phishing email still remains one of the top malware propagation medium. Recently, we came across an interesting phishing email containing couple of Jumpshare links pointing to malicious components. Jumpshare is an online file sharing service and often cyber criminals abuse these kind of file sharing services. Upon clicking on one of the links in…

Read more