Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Malware

Backup is Back

Flannel shirts, acid-washed jeans, Polaroid cameras, and vinyl records—these items which were once out of style are now emerging as popular must-haves among the younger generation. In the realm of IT, data backup has always been a necessity. Initially, it represented a compelling concept—storing data in an alternate location to ensure redundancy and failover capabilities in preparation for natural disasters.

Parablu's Guide to 2024 Ransomware Playbook

Ransomware incident response is the need of the hour. Let me explain you why- Ransomware attacks have evolved to become a critical threat in 2024, while recovery from such an attack increased drastically from $1.82 million in 2023 to a whopping $2.73 million this year—which is sans any ransom paid out. Healthcare organizations have fallen victim quite badly, where the cost of data breaches increased by 53.3% since 2020.

How Popular Malware Is Stealing Credentials and What You Can Do About It

Credentials are prime targets for attackers, as they make it easy to access resources as legitimate users without discovering vulnerabilities or using technical exploits. Malware authors know how interesting these low-hanging fruits are and are coming after your secrets!

Arctic Wolf Observes Akira Ransomware Campaign Targeting SonicWall SSLVPN Accounts

On August 22, 2024, a remote code execution vulnerability (CVE-2024-40766) was disclosed in SonicOS, affecting a selection of SonicWall firewall devices. At the time of disclosure, active exploitation was not known and no proof-of-concept exploit was publicly available. As of September 6, 2024, however, the security advisory has been updated with additional details, indicating that the vulnerability is potentially being actively exploited.

Achieving Complete Cyber Resilience in Healthcare

Ahead of Rubrik’s inaugural Healthcare Summit on September 12th, I thought it was appropriate to set the stage for what’s coming. Threat actors aren’t going to wait for you to get ready before they launch their attack. They’re banking on you not being able to recover your data—or not being able to recover fast enough—to maximize the damage they leave in their wake.

Revival Hijack: How Abandoned PyPI Package Names Are Being Exploited to Deliver Malware

Security researchers have uncovered a novel and concerning method for cybercriminals to distribute malware using public code repositories. Known as "Revival Hijack," this technique involves the re-registration of previously abandoned package names on the PyPI repository. By taking advantage of the fact that PyPI allows the reuse of names from removed packages, attackers are able to slip malicious code into unsuspecting organizations.

It's Time to Press Play on the AI Pause: Data Security Insights for a New Era

This past summer was the first time I watched the Olympics since moving to the U.S. Besides appreciating the sheer greatness of the American Olympic spirit, there was also another thing that could not go missed - AI! Filling up every commercial slot seemed to be AI. And mainly, the commercials focused on harnessing AI for business productivity and operations. No matter your take on the greatest Olympic moment or greatest AI commercial, one could not overlook this overwhelming trend.