JPCERT shares Windows Event Log tips to detect ransomware attacks

September 30, 2024 at 03:23PM JPCERT/CC has shared tips to detect different ransomware gang attacks based on Windows Event Logs, allowing timely detection of ongoing attacks before spreading too far into a network. Based on the meeting notes, the key takeaways are: 1. Japan’s Computer Emergency Response Center (JPCERT/CC) has provided tips on detecting various … Read more

Cisco Patches High-Severity Vulnerabilities in IOS Software

September 26, 2024 at 09:19AM SecurityWeek Network offers cybersecurity news, webcasts, and virtual events. It covers various topics such as malware, cyberwarfare, data breaches, ransomware, and more. It also provides information on security operations, threat intelligence, incident response, and risk management. Additionally, it features sections on CISO strategy, industrial cybersecurity, funding, and M&A in cybersecurity. … Read more

How to spot a North Korean agent before they get comfy inside payroll

September 24, 2024 at 08:05AM Amid rising exposure to North Korean moles seeking US IT roles, Mandiant provides tips for spotting them. These include diligent background checks, scrutinizing emails and resumes for inconsistencies, and employing measures such as biometric identity verification and video interviews. Additionally, they advise monitoring network traffic, tracking laptop serial numbers, and … Read more

1 in 10 orgs dumping their security vendors after CrowdStrike outage

September 19, 2024 at 12:19PM Germany’s Federal Office for Information Security reports 1 in 10 German organizations affected by CrowdStrike’s July outage are dropping their current vendor’s products. 4% have already abandoned solutions, with another 6% planning to do so. Despite potential business impacts, the incident hasn’t hurt CrowdStrike much yet. The findings are from … Read more

CISA Releases Cyber Defense Alignment Plan for Federal Agencies

September 19, 2024 at 11:06AM CISA released the FOCAL plan to align federal agencies against cyberthreats. It aims to standardize operational cybersecurity practices across agencies and identify collective cybersecurity goals. The plan outlines five priority areas and presents alignment goals to improve operational cybersecurity and resilience for the Federal Civilian Executive Branch (FCEB). Based on … Read more

GitLab Patches Critical Authentication Bypass Vulnerability

September 19, 2024 at 06:15AM “Virtual event now live: Attack Surface Management Summit. Connect with SecurityWeek for cybersecurity news, webcasts, and virtual events covering topics such as ICS, cyber threats, data breaches, security operations, and risk management. Also, explore sessions on CISO strategy, industrial cybersecurity, funding/M&A, and more.” It seems like the meeting notes are … Read more

Ransomware gangs now abuse Microsoft Azure tool for data theft

September 17, 2024 at 12:16PM Ransomware gangs like BianLian and Rhysida are increasingly utilizing Microsoft’s Azure Storage Explorer and AzCopy to steal data from breached networks and store it in Azure Blob storage. Despite extra work required to get Azure Storage Explorer operational, the focus on data theft is indicative of the increasing leverage for … Read more

Snowflake slams ‘more MFA’ button again – months after Ticketmaster, Santander breaches

September 16, 2024 at 12:53PM Snowflake has made multi-factor authentication (MFA) the default for all new user accounts, following investigations into data thefts. This change follows pressure to enhance security, with additional password strength measures also being implemented. Snowflake aims to eliminate password-only authentication in the long term and advises users to consult security best … Read more

From Breach to Recovery: Designing an Identity-Focused Incident Response Playbook

September 16, 2024 at 08:21AM The text discusses the growing threat of identity-based cyber attacks and the need for organizations to adapt their incident response plans accordingly. It highlights the importance of an identity-focused playbook in detecting, containing, and recovering from identity breaches. The accompanying webinar promises to provide strategies for IT security professionals, incident … Read more

So you paid a ransom demand … and now the decryptor doesn’t work

September 11, 2024 at 09:39AM Executives and security leaders facing ransomware attacks endure immense stress and uncertainty. In a recent incident involving Hazard ransomware, victims paid a ransom for a decryption tool that ultimately didn’t work, escalating their distress. Despite this, cybersecurity experts emphasize the need for caution, as success with decryption tools is not … Read more