Phorpiex botnet shuts down, source code goes up for sale

in cybersecurity •  3 years ago 

Ransomware hackers continue upping their game, organizations and their cyber security army needs to do the same.


Source: https://QUE.com

LockFile Ransomware Bypasses Protection Using Intermittent File Encryption
A new ransomware family that emerged last month comes with its own bag of tricks to bypass ransomware protection by leveraging a novel technique called “intermittent encryption.”

Called LockFile, the operators of the ransomware have been found exploiting recently disclosed flaws such as ProxyShell and PetitPotam to compromise Windows servers and deploy file-encrypting malware that scrambles only every alternate 16 bytes of a file, thereby giving it the ability to evade ransomware defences.

continue reading: https://thehackernews.com/2021/08/lockfile-ransomware-bypasses-protection.html?&web_view=true

Phorpiex botnet shuts down, source code goes up for sale
The operators of the Phorpiex malware have shut down their botnet and put its source code for sale on a dark web cybercrime forum, The Record has learned.

The ad, posted earlier today by an individual previously linked to the botnet’s operation, claims that none of the malware’s two original authors are involved in running the botnet, hence the reason they decided to sell its source code.

continue reading: https://therecord.media/phorpiex-botnet-shuts-down-source-code-goes-up-for-sale

Challenges organizations face when implementing zero trust architecture
98 percent of UK business leaders and IT decision makers either plan to or have already started implementing zero trust strategies at their organizations, according to Illumio.

The report also revealed the challenges organizations face when implementing zero trust architecture. Respondents cited employee perception and resistance to change as the primary barriers to activating their zero trust plans. Notably, 32 percent of respondents expressed concern about employees thinking the company doesn’t trust them.

continue reading: https://www.helpnetsecurity.com/2021/08/27/implementing-zero-trust-architecture/

More Cyber Security News at https://QUE.com/tag/cybersecurity

Thank you for reading and stay safe.
@Yehey

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE BLURT!
Sort Order:  

Congratulations, your post has been curated by @dsc-r2cornell. You can use the tag #R2cornell. Also, find us on Discord

Manually curated by @blessed-girl

logo3 Discord.png

Felicitaciones, su publicación ha sido votada por @ dsc-r2cornell. Puedes usar el tag #R2cornell. También, nos puedes encontrar en Discord

  ·  3 years ago  ·  

Nice🙆