Ransomware hackers continue upping their game, organizations and their cyber security army needs to do the same.
Source: https://QUE.com
LockFile Ransomware Bypasses Protection Using Intermittent File Encryption
A new ransomware family that emerged last month comes with its own bag of tricks to bypass ransomware protection by leveraging a novel technique called “intermittent encryption.”
Called LockFile, the operators of the ransomware have been found exploiting recently disclosed flaws such as ProxyShell and PetitPotam to compromise Windows servers and deploy file-encrypting malware that scrambles only every alternate 16 bytes of a file, thereby giving it the ability to evade ransomware defences.
continue reading: https://thehackernews.com/2021/08/lockfile-ransomware-bypasses-protection.html?&web_view=true
Phorpiex botnet shuts down, source code goes up for sale
The operators of the Phorpiex malware have shut down their botnet and put its source code for sale on a dark web cybercrime forum, The Record has learned.
The ad, posted earlier today by an individual previously linked to the botnet’s operation, claims that none of the malware’s two original authors are involved in running the botnet, hence the reason they decided to sell its source code.
continue reading: https://therecord.media/phorpiex-botnet-shuts-down-source-code-goes-up-for-sale
Challenges organizations face when implementing zero trust architecture
98 percent of UK business leaders and IT decision makers either plan to or have already started implementing zero trust strategies at their organizations, according to Illumio.
The report also revealed the challenges organizations face when implementing zero trust architecture. Respondents cited employee perception and resistance to change as the primary barriers to activating their zero trust plans. Notably, 32 percent of respondents expressed concern about employees thinking the company doesn’t trust them.
continue reading: https://www.helpnetsecurity.com/2021/08/27/implementing-zero-trust-architecture/
More Cyber Security News at https://QUE.com/tag/cybersecurity
Thank you for reading and stay safe.
@Yehey
Congratulations, your post has been curated by @dsc-r2cornell. You can use the tag #R2cornell. Also, find us on Discord
Felicitaciones, su publicación ha sido votada por @ dsc-r2cornell. Puedes usar el tag #R2cornell. También, nos puedes encontrar en Discord
Nice🙆