How to Make a Ransomware Attack Worse
Will your actions after a successfully ransomware attack affect the outcome? Yes, without a doubt. Learn what to do and not do after a ransomware attack.
What you do after matters
Apple Ships Urgent Patch for FORCEDENTRY Zero-Days
This week Apple issued patches for the macOS and iOS platforms on vulnerabilities it said are currently being exploited.
Install new Apple patches ASAP
Microsoft Patches MSHTML Vuln Among 66 CVEs
Microsoft issued patches for 66 vulnerabilities. Some under active exploitation and considered severe. Be sure and update your systems.
Install MS Patches ASAP
Nearly 50% of On-Premise Databases Have Vulnerabilities
Nearly every company has databases. Recent research shows that almost half have multiple unpatched vulnerabilities, the average being 26 of them. Males you think twice about sharing private information if a company doesn’t even protect its own information.
Half of on prem databases have vulnerabilities
Ransomware Operators Ramp Up Pressure on Victims via Multiple Extortion Attacks
As if ransomware wasn’t enough, attackers are using data theft, denial of service attackers and even harassing the customers of the ransomware attack. All to get you to pay.
Ransomware operators up the pressure
Multi Factor Authentication Is Not The Ultimate Answer
Multi Factor Authentication, MFA, is an important tool. But MFA by itself will not protect against two of the most successful attack methods, exploiting bugs, and social engineering. If you aren’t addressing those attack methods, then you are not serious about protecting your data.
MFA won't protect against 2 popular attack types
Patch now! Microsoft Exchange is being attacked via ProxyShell
Three current vulnerabilities in Exchange are being exploited. Implementing the patches is essential but will not counter an attack that already took place. Many customers of Microsoft’s cloud based Exchange service don’t understand that they may still have an exchange server on premises making them vulnerable.
MicroSoft Exchange under serious attack
FBI Issues Advisory on 'OnePercent' Ransomware Group
This group has been targeting companies since Fall 2020 with two powerful exploits. One is the PowerShell exploit described in another Insight post. But both are being used to deliver ransomware and to cause widespread infections before the ransomware is triggered.
FBI Issues Warning About Serious Attacks
Microsoft Azure Cosmos Vulnerability: ChaosDB Exposure Details
Microsoft closed a vulnerability in the Azure database service that has been exploited for months. After implementing the fix, users of the service need to regenerate their databases to be on the safe side.
Microsoft Azure database being exploited
Tech giants pledge at least $30 billion to improve cybersecurity following White House meeting
A recent White House meeting of the major tech companies resulted in a commitment of significant money to combat cyber threats. Equally important is the recognized need for a coordinated effort to enable an effective cyber defense.
Tech Giants Join Forces to Improve Cybersecurity
1st and 3rd Party Cyber Risks are Not the Same
Cyber insurance distinguishes between 1st and 3rd party cyber risks. Without understanding this critical difference, you may find that your policy doesn’t cover loses you have incurred.
3rd party risks may not be covered
Phishing Costs Nearly Quadrupled Over 6 Years
Phishing costs include more than the ransom. In fact, the ransom may be the smaller portion of the costs when compared with restoring systems and lost productivity.
Phishing Costs Skyrocket
T-Mobile: Breach Exposed SSN/DOB of 40M+ People
The breach recently announced by T-Mobile affected over 40 million people exposing some of the most private information, Social Security numbers and dates of birth. Key information used for identity theft.
T-Mobile Breach reveals highly personal information
Troubling New Disk-Level Encryption Ransomware Surfaces
A new strain of ransomware was found that is more insidious than the others. This one encrypts the drives on the servers instead of attacking end user systems. To make matters worse, it also uses a legitimate encryption tool and encrypts the decryption key and requires a password only the attackers have.
New ransomware strain attacks servers
Video surveillance network hacked by researchers to hijack footage
A Chinese company called ThroughTec offers a cloud based service called Kalay for the automation of home automation devices. The pitch is instead of each home automation vendor building their own protocol and servers to simply build the Kalay offering into their devices. Kalay was found to have a way for unauthorized people to hack the system and monitor the home automation devices including cameras.
Home Automation Service Hacked