A week in security (January 20 – 26)

Last week on Malwarebytes Labs, we reported on a Ryuk ransomware attack on The Tampa Bay Times, a newspaper in Florida; unmasked an elaborate browser locking scheme behind the more advanced tech support operations that are currently active; and looked at the latest laws on regulating deepfakes. Other cybersecurity news Cisco’s Talos Intelligence Group discovered a new data stealer and … [Read more...]

Am I Smart or Just Lucky? Understanding Your Process Integrity Risk with Tenable Lumin

Business system risk and process integrity risk are two essential metrics for a mature risk-based vulnerability management practice. With new assessment maturity scoring, Tenable Lumin now gives you insights into both. Risk-based vulnerability management requires metrics addressing two types of risks: Business system risk Process integrity risk Reducing business system risk requires understanding … [Read more...]

Tampa Bay Times hit with Ryuk ransomware attack

Florida newspaper The Tampa Bay Times suffered a Ryuk ransomware attack Thursday, making it the latest major victim of the notorious ransomware family that continues to rise in popularity. Curiously, the paper is at least the third Florida-based Ryuk victim in the past year. The attack, which The Tampa Bay Times reported on itself, did not result in any breached data. Sensitive customer … [Read more...]

What is the Federal Information Security Management Act (FISMA)?

Updated most recently in 2014, FISMA defines a framework to defend information, operations, and digital assets against natural disasters and man-made cyber threats. … [Read more...]

How to Use ASR and Hyper-V Replica with Failover Clusters

Overview of Microsoft’s replication solutions for multi-site clusters & integrating backup/DR. Covers Hyper-V Replica, Azure Site Recovery, DFS Replication Read the post here: How to Use ASR and Hyper-V Replica with Failover Clusters … [Read more...]

How Does LDAP Authentication Work?

<p>Today’s businesses rely on a growing list of professional applications to support mission-critical operations. In fact, <a href="https://www.wsj.com/articles/employees-are-accessing-more-and-more-busi… Wall Street Journal</em></a> reports that 10% of businesses now have more than 200 applications in their tech stack, with figures for both small and large organizations … [Read more...]

Kerberos Authentication Process Explained

<p>In Greek mythology, Kerberos (or Cerberus) is a frightening-looking dog with multiple heads and fangs capable of slicing through human bone. Kerberos is famous for guarding the gates of the underworld to prevent the dead from leaving. Until Kerberos’ capture by the divine hero Heracles, the dog’s tenacious patrol let no soul pass into the world of the living.</p> Read More … [Read more...]

Deepfakes laws and proposals flood US

In a rare example of legislative haste, roughly one dozen state and federal bills were introduced in the past 12 months to regulate deepfakes, the relatively modern technology that some fear could upend democracy. Though the federal proposals have yet to move forward, the state bills have found quick success at home. Already three states—California, Virginia, and Texas—have enacted deepfake … [Read more...]

How to Know If Your Smart Home Is Vulnerable

Do you ever wonder if your smart home is vulnerable to cyber threats? As we place more and more connected devices in our homes to automate simple tasks that used to be done manually, we also place more and more risk for unwanted attackers to compromise our personal lives. What if you had a way to find out whether there are vulnerabilities in your home systems that attackers can exploit? You’re in … [Read more...]

Phenomenal Channel Performance Boosts Thycotic Revenues in 2019

WASHINGTON, D.C., January 23, 2020 —  Thycotic, provider of privileged access management (PAM) solutions for more than 10,000 organizations worldwide, including 25 of the Fortune 100, today announced a rise in total worldwide revenues of 67 percent in 2019.   Thycotic’s global indirect sales were up by 35 percent year on year, helped considerably by strong business demands for PAM solutions … [Read more...]