Top 5 privileged account security reports CISOs must have: What computers in Active Directory no longer exist?

By RJ Gazarek When you know which computers in Active Directory no longer exist or have been decommissioned, you can quickly take action to protect your organization from the multitude of risks presented by unknown or unmanaged systems and accounts. Hackers target your privileged account credentials for good reason. Once they gain access, they can escalate their privileges and move through your … [Read more...]

Bye, bye Petya! Decryptor for old versions released.

By Malwarebytes Labs Following the outbreak of the Petya-based malware in Ukraine, the author of the original version, Janus, decided to release his master key, probably closing the project. You can read the full story here. Based on the released key, we prepared a decryptor that is capable of unlocking all the legitimate versions of Petya (read more about identifying Petyas): Red Petya Green … [Read more...]

A week in security (July 17 – July 23)

By Malwarebytes Labs Over the last week, we have covered Play Protect, android's new security system and how the Dutch police ran Hansa Market after the take down of Alpha Bay, both major players on the Dark Web. We also provided some tips on how to stay cyber safe this summer. We also saw how the Terror exploit kit started dabbling in ad fraud, more specifically URL shortener fraud. And last … [Read more...]

Tenable Delivers Record Results in Q2 and the First Half of 2017

By Cayla Baker Explosive global demand fuels over 50 percent billings growth Tenable Network Security®, Inc., the Cyber Exposure company, today announced record second quarter results with over $50 million in billings, which represents over 50 percent growth year-over-year. Tenable's record results make it one of the world's largest and fastest-growing private cybersecurity companies and … [Read more...]

Cyber Exposure: The Next Frontier for Security

By Jennifer Johnson The stakes have never been higher when it comes to cybersecurity. Global cyber attacks such as the recent WannaCry ransomware attack is a sobering reminder that cybersecurity is the existential threat of this generation. A new report from Lloyd's of London estimates a serious cyber attack could cost the global economy more than $120 billion - as much as catastrophic natural … [Read more...]

Play Protect: Android’s new security system is now available

By Malwarebytes Labs Play Protect, a security suite for Android devices, was originally introduced in mid-May of this year during the Google I/O conference. And in just a couple of months, the tech giant has made it available for all their mobile users. Play Protect is the amalgamation of Google's Android security features, such as Verify Apps and Bouncer, and it's integrated into the Google … [Read more...]

Black Hat Sneak Preview: New Vulnerabilities Exposed in Docker Hub

By Anthony Bettini Community ecosystems with vibrant member support have been the catalyst for faster innovation and shorter software development lifecycles in DevOps. Whether it is downloading code or contributing back to the community, organizations today rely heavily on open source software to drive their business. In fact, modern application development is more about assembling existing … [Read more...]

7 tips to stay cyber safe this summer

By Wendy Zamora You've probably already seen the back-to-school ads on TV and rolled your eyes a little bit. We're with you: There's still plenty of summer left. That's why we want to remind you about some of the cybersecurity pitfalls you might encounter during the remainder of the summer season. Whether you're home with the kids or heading out on vacation, here are some ways you can tighten up … [Read more...]

Hansa Market on Dark Web was controlled by Dutch police

By Pieter Arntz In a simultaneous press conference issued by the Dutch police and US Attorney General Jeff Sessions we learned that the Dark Web market places Alphabay and Hansa market have been seized and shut down by international cooperating authorities. As it turned out Hansa Market was already under control of the Dutch police for 27 days. After the take-down by Canadian, US, and Thai … [Read more...]

Auditing Patch Management Solutions with

By Stephanie Dunn We receive many questions from customers on how to configure scans to audit their patch management solutions. Whether you have a few hundred or several thousand systems, patch management solutions provide one of the easiest ways to maintain integrity and stability of systems within your network. Unfortunately, no matter what type of solution you are using, or how often you are … [Read more...]