The CryptoWall 4.0 ransomware is being spread via exploit kits, with the Nuclear exploit kit (EK) being the first major crimekit to infect machines with this type of malware, Rackspace security researcher Brad Duncan has discovered.
Although ransomware is commonly targeted at consumers, recent versions have targeted the enterprise with a vengeance. This has shifted ransomware from a nuisance to a potentially debilitating attack that can freeze critical assets and intellectual property.
Organizations continue to suffer from alert fatigue, making it difficult to make informed decisions in a timely manner. A narrative-driven model provides an adequate framework to support timely, actionable, and informed decisions.
Cyber Threat Intelligence (CTI) is critical for organizations that want to gain a comprehensive, tailored and relevant view of the potential threats and types of attackers that could be targeting them.
Attackers are thinking outside the box, using sophisticated breach methods and taking advantage of a very collaborative ecosystem. Perhaps it’s time to supplement all our security defenses with a hacker-centric security paradigm.
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
The DHS initiated the Continuous Diagnostics and Mitigation program to safeguard and secure Federal Information Technology networks. But can the DHS CDM program really strengthen the security posture of government networks?