On February 3, Toll Group, an Australian transportation and logistics company, shut down its IT systems as a result of a “cyber security incident.” The organization reported shortly thereafter that multiple sites and business units had been targeted with ransomware attacks. The Mailto or Kazkavkovkiz ransomware affecting Toll Group is very similar to the many variants of … [Read more...]
Search Results for: advanced malware
2020 Security Predictions: 25% of All Breaches Will Happen Outside the Perimeter
Mobile device usage and remote employees have been on the rise for several years now. A recent survey by WatchGuard and CITE Research found 90% of midmarket businesses have employees working half their week outside the office. While remote working can increase productivity and reduce burnout, it comes with its own set of security risks. Mobile employees often work without any … [Read more...]
2020 Security Predictions: Ransomware Targets the Cloud
Ransomware is now a billion-dollar industry for hackers, and over the last decade we’ve seen extremely virulent strains of this malware wreak havoc across all types of businesses. As with any big-money industry, ransomware will continue to evolve in order to maximize profits. In 2020, we believe ransomware will focus on the cloud. Recently, untargeted “shotgun blast” … [Read more...]
Set Employees Free with Security That Travels
With the average person managing 90 accounts that require a username and password, and credential-stealing malware on the rise, your users are firmly in the crosshairs of cyber criminals. At the same time, the drive toward workplace flexibility and desire to empower people to work where they are most comfortable challenges some foundations of cyber security. More work than ever … [Read more...]
Security Researcher Track: 102
Building off of the “101” article written here, let’s continue on with the roadmap to becoming a security researcher. In the previous article I explained the many interpretations of what this role consists of versus the “white hat hacker” nomenclature. In this blog post and onward I will be sticking to the “security researcher” title (unless otherwise stated), as this seems … [Read more...]