You might be interested in …

[ZDNet] Ransomware: Now gangs are using virtual machines to disguise their attacks

All posts, ZDNet

Ransomware operators are using virtual machines to avoid their unusual network activity being spotted before they deploy their malware. Source: Read More (Latest topics for ZDNet in Security)

Read More

[BleepingComputer] Prometheus TDS: The $250 service behind recent malware attacks

Security researchers investigating multiple malware distribution campaigns found that an underground traffic distribution service called Prometheus is responsible for delivering threats that often lead to ransomware attacks. […] Source: Read More (BleepingComputer)

Read More

[HackerNews] Report to Your Management with the Definitive ‘Incident Response for Management’ Presentation Template

All posts, HackerNews

Security incidents occur. It’s not a matter of ‘if’ but of ‘when.’ There are security products and procedures that were implemented to optimize the IR process, so from the ‘security-professional’ angle, things are taken care of. However, many security pros who are doing an excellent job in handling incidents find effectively communicating the ongoing process […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.