Is the Akira ransomware story coming to an end? Security researchers say the group was competing in a competition designed by Royal to give it a new cryptolocker - but lost. Even with a free decryptor now available for Akira victims, however, it's too soon to say if the group might be doomed.
The proposed $2.45 billion sale of Forcepoint's government security business to TPG will fuel investment and growth for both public sector and commercial customers, CEO Manny Rivelo said. Forcepoint determined that its government practice would benefit from an additional set of investments.
While self-proclaimed Russian hacktivist groups such as KillNet, Tesla Botnet and Anonymous Russia claim they're wreaking havoc on anti-Moscow targets, a fresh analysis of their attacks finds that despite rampant self-promotion, their real-world cybersecurity impact is typically negligible.
Despite the significant advances technology has made over the past few years, email remains one of the best tools for cybercriminals. Training is just one piece of the puzzle. The best defense against today's cybercrime landscape is a multilayered security strategy.
Security appliance manufacturers SonicWall and Fortinet fixed multiple critically rated vulnerabilities in their network security products this week. The fixes include authentication bypass flaws that could result in exposure of sensitive information. Regulators urge users to patch soon.
Service providers typically lack the skills and large security teams needed to thwart complex and high-volume cyberattacks on their own, said A10 Networks CEO Dhrupad Trivedi. MSPs telecom and cloud providers struggle to assess the scale of cyber incidents and to detect and remediate them.
A growing number of security teams are looking to consolidate tools to simplify operations, said Gartner analyst Dionisio Zumerle. "When you have the complexity, it's very hard to identify misconfigurations between the different overlapping tools, and it's also hard to identify security gaps."
A service selling DDoS disruptions via a Mirai-based botnet called Condi is the latest to target consumer-grade Wi-Fi routers made by TP-Link with firmware not yet patched to fix a known flaw. Unusually, a recently spotted sample of Condi has been stripped down to target only that flaw.
Connectivity and security. As more global enterprises expand their cloud migrations, these two challenges loom larger. Fortinet and Microsoft have now partnered to address these issues, and Fortinet's Piotr Nowotarski and Srija Allam speak to the benefits for customers and partners alike.
Small and midsize businesses need proactive measures to ensure security just as much as any large organization. But challenges abound for SMBs as they struggle with a smaller staff and budget constraints, making them more vulnerable to cyberattacks, said SonicWall President and CEO Bob VanKirk.
Check Point's product sales have taken their biggest nosedive since 2018 as customers extend sales cycles and postpone projects while prospects decline to buy new products. The company said businesses have increasingly delayed product refresh projects since November in an effort to tighten budgets.
Networking was created as a "trust everything" approach that "doesn't know who you are, doesn't know your content or why you're doing it." In the future, according to John Maddison, CMO of Fortinet, all that connectivity will be secure, and the market for secure networking will become bigger.
The way we secure workloads today is vastly different due to remote work and the move to the cloud following the pandemic. More modern SASE solutions such as zero trust have been adopted, and organizations are moving from legacy such as MPLS to software-defined networking and cloud-based solutions.
Warning to criminals: Could that cybercrime service you're about to access really be a sting by law enforcement agents who are waiting to identify and arrest you? That's the message from British law enforcement agents, who say they're running multiple DDoS-for-hire sites as criminal honeypots.
The increasing volume, frequency and sophistication of cyberattacks has made cyber resiliency a top priority for security leaders. But there are certain roadblocks to overcome before an organization can be cyber resilient, advise Samir Mishra and Navin Mehra of Cisco.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.