Security News > 2021
Ransomware has emerged as one of the most pernicious security threats to organizations and one that has proved to be lucrative for the criminals who practice it. Ransomware operators are getting savvier and more daring, leading to increasingly costly incidents for compromised organizations.
Most of the cyberattacks on cloud environments have been due to compromised credentials, says Centrify. Survey results released Wednesday by security firm Centrify show how cloud environments can be vulnerable, while its CEO offers advice for protecting your cloud-based assets.
Insider Risk Management builds a framework around the new paradigm of "Risk tolerance," aiming to give security teams the visibility and context around data activity to protect that data, without putting rigid constraints on users. The answer is a new category of data security technology: Insider Risk Management.
An English college has temporarily closed all eight of its campuses and moved all teaching online after a "Major" ransomware attack "Disabled" its IT systems. "The College has suffered a major ransomware attack on our IT system which has disabled many of our core IT systems," the institute said in a note to students posted on its website.
Email security company Mimecast on Tuesday said it completed its forensic investigation into the impact of the SolarWinds supply chain attack, and revealed that the threat actor managed to steal some source code. Mimecast was one of the several cybersecurity companies to confirm being targeted by the hackers who breached the systems of IT management solutions provider SolarWinds.
San Francisco-based cyber insurance and security company Coalition has achieved unicorn status after raising $175 million at a $1.75 billion valuation. The latest funding round brings the total raised by Coalition to more than $300 million.
Now the content-delivery network Akamai has reported on a new method: a botnet that uses the Bitcoin blockchain ledger. Blockchains are a type of "Distributed ledger": a record of all transactions since the beginning, and everyone using the blockchain needs to have access to - and reference - a copy of it.
A security researcher was able to add a counterfeit test package to the official list of Microsoft Azure SDK latest releases. The simple trick if abused by an attacker can give off the impression that their malicious package is part of the Azure SDK suite.
A security researcher was able to add a counterfeit test package to the official list of Microsoft Azure SDK latest releases. The simple trick if abused by an attacker can give off the impression that their malicious package is part of the Azure SDK suite.
A security researcher was able to add a counterfeit test package to the official list of Microsoft Azure SDK latest releases. The simple trick if abused by an attacker can give off the impression that their malicious package is part of the Azure SDK suite.