Security News

The REvil ransomware operation is now using a Linux encryptor that targets and encrypts Vmware ESXi virtual machines. With the enterprise moving to virtual machines for easier backups, device management, and efficient use of resources, ransomware gangs increasingly create their own tools to mass encrypt storage used by VMs. In May, Advanced Intel's Yelisey Boguslavskiy shared a forum post from the REvil operation where they confirmed that they had released a Linux version of their encryptor that could also work on NAS devices.

Despite putting thorough and rigorous defensive security measures in place, ransomware is still getting in and corrupting data, forcing organisations to pay massive ransom fees. If you'd like an insight into how cyber attackers really think, you should join Rubrik's upcoming Data Security Talks on July 1, at 1000 CEST. That's because this free, online event will feature a one-hour presentation from notorious hacker and social engineering pioneer, Kevin Mitnick.

The use of virtual machines to run the malicious payload is getting more popular with ransomware attackers, Symantec's Threat Hunter Team claims. "During a recent investigation into an attempted ransomware attack, Symantec discovered that the attackers had installed a VirtualBox VM on some compromised computers. Unlike the previously documented RagnarLocker attacks, which involved Windows XP, the VM in this case appeared to be running Windows 7," they shared.

To select a suitable virtual SOC solution for your business, you need to think about a variety of factors. Flexible extension of your security team: Beyond 24/7 monitoring, a virtual SOC must also include threat hunting and research, data engineering and science, and solution architects that work as a seamless extension to your team.

Datto reintroduced its Virtual SIRIS data protection software. Delivered as a virtual appliance, this software-only version of the Datto SIRIS solution provides MSPs with the flexibility to meet the diverse data protection requirements of their small and medium business clients with fully integrated software running on their own hardware.

They have developed SeKVM, the first system that guarantees - through a mathematical proof - the security of virtual machines in the cloud. The researchers hope to lay the foundation for future innovations in system software verification, leading to a new generation of cyber-resilient system software.

In this presentation, Microsoft's John Lambert will talk about how it's more important than ever for defenders and organizations to come together and better share information that can help the entire ecosystem protect against emerging threats. The good news is there are industry frameworks and sharing mechanisms already in place to facilitate actionable threat intelligence and defense collaboration.

At the first-ever virtual Google I/O, Alphabet Chief Executive Officer Sundar Pichai talked about news on Workspace, quantum computing and privacy needs. The keynote for Google I/O was live streamed from Google's headquarters in Mountain View, California on Tuesday, and Google executives touched on everything from new collaboration features in Workspace, to quantum computing, to improved privacy controls.

Addressing Fortune 500 business concerns, this virtual series will provide the supply chain analysis of the SunBurst compromise, while offering attendees new approaches and immediate actions they can take to mitigate future unknown software supply chain attacks. "Our team led the charge in dissecting the supply chain portion of this incident and introducing new approaches that businesses can use to detect and prevent future software supply chain attacks. Through this roadshow, our experts will help attendees better understand the anatomy of a supply chain attack and receive prescriptive recommendations to stop this kind of compromise."

Cobalt Iron announced that its Compass enterprise software-as-a-service backup platform now enables seamless management of Google Cloud Platform virtual machine snapshots. Through this new capability, Compass users are able to manage backup retentions and schedules for GCP VM snapshots using the Compass Commander GUI, the same interface with which they manage their enterprise backups.