Security News
Despite putting thorough and rigorous defensive security measures in place, ransomware is still getting in and corrupting data, forcing organisations to pay massive ransom fees. If you'd like an insight into how cyber attackers really think, you should join Rubrik's upcoming Data Security Talks on July 1, at 1000 CEST. That's because this free, online event will feature a one-hour presentation from notorious hacker and social engineering pioneer, Kevin Mitnick.
The use of virtual machines to run the malicious payload is getting more popular with ransomware attackers, Symantec's Threat Hunter Team claims. "During a recent investigation into an attempted ransomware attack, Symantec discovered that the attackers had installed a VirtualBox VM on some compromised computers. Unlike the previously documented RagnarLocker attacks, which involved Windows XP, the VM in this case appeared to be running Windows 7," they shared.
To select a suitable virtual SOC solution for your business, you need to think about a variety of factors. Flexible extension of your security team: Beyond 24/7 monitoring, a virtual SOC must also include threat hunting and research, data engineering and science, and solution architects that work as a seamless extension to your team.
Datto reintroduced its Virtual SIRIS data protection software. Delivered as a virtual appliance, this software-only version of the Datto SIRIS solution provides MSPs with the flexibility to meet the diverse data protection requirements of their small and medium business clients with fully integrated software running on their own hardware.
They have developed SeKVM, the first system that guarantees - through a mathematical proof - the security of virtual machines in the cloud. The researchers hope to lay the foundation for future innovations in system software verification, leading to a new generation of cyber-resilient system software.
In this presentation, Microsoft's John Lambert will talk about how it's more important than ever for defenders and organizations to come together and better share information that can help the entire ecosystem protect against emerging threats. The good news is there are industry frameworks and sharing mechanisms already in place to facilitate actionable threat intelligence and defense collaboration.
At the first-ever virtual Google I/O, Alphabet Chief Executive Officer Sundar Pichai talked about news on Workspace, quantum computing and privacy needs. The keynote for Google I/O was live streamed from Google's headquarters in Mountain View, California on Tuesday, and Google executives touched on everything from new collaboration features in Workspace, to quantum computing, to improved privacy controls.
Addressing Fortune 500 business concerns, this virtual series will provide the supply chain analysis of the SunBurst compromise, while offering attendees new approaches and immediate actions they can take to mitigate future unknown software supply chain attacks. "Our team led the charge in dissecting the supply chain portion of this incident and introducing new approaches that businesses can use to detect and prevent future software supply chain attacks. Through this roadshow, our experts will help attendees better understand the anatomy of a supply chain attack and receive prescriptive recommendations to stop this kind of compromise."
Cobalt Iron announced that its Compass enterprise software-as-a-service backup platform now enables seamless management of Google Cloud Platform virtual machine snapshots. Through this new capability, Compass users are able to manage backup retentions and schedules for GCP VM snapshots using the Compass Commander GUI, the same interface with which they manage their enterprise backups.
Armory introduced Armory Minnaker, a virtual machine leveraging K3s and the Armory Operator to enable software deployments in only 10 minutes instead of 10 days. Armory Minnaker is a full Spinnaker installation packaged inside a virtual machine running the certified K3s Kubernetes distribution.