Cybersecurity firms step up intel sharing despite issues of trust

The war against cybercriminals won’t be won alone. To keep hackers at bay, security vendors are establishing more ways for their customers to cooperate and share data about the latest threats -- even as it sparks concerns about trust and competition.

  • 0
  • 0

PowerWare ransomware variant poses as Locky, but can be decrypted

The ransomware PowerWare that commandeers Microsoft's PowerShell utility to download and run malicious code, now has a variant that mirrors Locky ransomware. according to Palo Alto Networks.

  • 0
  • 0

Let’s not forget RegTech is also about cybersecurity

Regulatory Technology (RegTech) is becoming more of a tool to help organisations comply with automation and regulatory requirements, but Palo Alto Networks believes that they should be aware of how it will affect cybersecurity and the implications on busines operations.

  • 0
  • 0

PowerWare Ransomware Masquerades as Locky to Intimidate Victims

A new variant of the PowerWare ransomware is stealing street creds from the Locky strain of ransomware in an attempt to spoof the malware family. A new sample of PowerWare found by Palo Alto Networks’ Unit 42 reveals the ransomware’s quickly evolving tactics.

  • 0
  • 0

Free decryption tools released for PowerWare and Bart ransomware

Researchers from security firm Palo Alto Networks have recently found a new version of this threat that imitates a sophisticated and widespread ransomware program called Locky. It uses the extension .locky for encrypted files and also displays the same ransom note used by the real Locky ransomware.

  • 0
  • 0

Effizienz versus Sicherheit: IT-Bereiche müssen Hand in Hand arbeiten

Trotz gegenseitiger Wertschätzung befinden sich der klassische IT-Betrieb und der Bereich Cybersicherheit häufig in einem Konflikt. Um die digitale Transformation der Wirtschaft aber voranzutreiben, müssen beide Hand in Hand gehen. Sie dürfen sich trotz vieler Widersprüche nicht ausbremsen, meint silicon.de-Blogger Thorsten Henning.

  • 0
  • 0

Does Defense In Depth Still Work Against Today’s Cyber Threats?

When it was first applied to the cybersecurity industry some 15 years ago, defense in depth revolutionized the business. Today, the idea of using a collection of security countermeasures to protect a network is an accepted best practice and traditional thought leaders in the cybersecurity space (financial services companies and the U.S. federal government) hold it as gospel.

  • 0
  • 0

Improvements and Uncertainty

The Cipher Brief: How has federal cybersecurity policy changed since the OPM hack? What progress has been made in terms of improving security?

  • 0
  • 0

Security verzuipt in grote IT-ruis

IT-beveiliging heeft behoefte aan kwalitatieve data en geautomatiseerde tools die hiermee aan de slag gaan. Alle meldingen van tools en appliances worden nu vaak nog handmatig gecoördineerd en daar gaat tijd aan verloren.

  • 0
  • 0

Wie die Cloud Sicherheitsanforderungen verändert

Immer mehr Unternehmen setzen heute auf eine Mischung aus lokal betriebener Hardware und Cloud-Computing-Anwendungen. Nur die wenigsten beachten dabei jedoch, dass Cloud-basierte Technologien und traditionelle Hardware-basierte Rechenzentren unterschiedliche Anforderungen an die Sicherheit stellen.

  • 0
  • 0

パロアルトネットワークス、脅威インテリジェンスを提供する新組織を発足

 セキュリティ企業のパロアルトネットワークスは6月7日、同社でセキュリティ脅威動向などの研究を手掛ける組織「Unit 42」の活動拠点を国内に設置したと発表した。併せてセキュリティ情報を発信する「CSO Japanチーム」を発足させた。

  • 0
  • 0

Holding the HMI Hostage—The Growing Threat of Ransomware

Most of the headlines concerning cyber attacks on Industrial Control Systems (ICS), tend to focus on one of three types of threat actor: nation-states (e.g. Stuxnet), cyber criminals stealing intellectual property (e.g. Energetic Bear), or terrorists (e.g. ISIS attacking national critical infrastructure).

  • 0
  • 0

Knowledge of attack patterns key to protecting digital operations

Companies and organizations must be able to first identify all cyberattack patterns in an attempt to develop a reliable protection system for their internet-based operations, an executive from a leading cybersecurity systems company suggested. However, a rise in the number of cyber attacks on the healthcare industry in 2015 has exposed vulnerabilities and risks that were previously not on the radars of many healthcare organizations.

  • 0
  • 0

【インタビュー】 セキュリティを盛り込んだIoT活用こそ日本企業の競争力に - パロアルト齋藤ウィリアム氏

IoTへの期待が大いに高まっている中、そのセキュリティを懸念する声も多々聞かれるようになっている。そこで、パロアルトネットワークスの副会長であり、内閣府本府参与(科学技術・IT戦略担当)として活躍する齋藤ウィリアム浩幸氏と、同社エバンジェリスト兼テクニカルディレクターの乙部幸一朗氏に、IoTにおけるセキュリティのあり方などについて話を聞いた。

  • 0
  • 0

Mobile Malware auf dem Vormarsch

Im Interview erklärt Thorsten Henning von Palo Alto Networks, welche Mobile Malware auf dem Vormarsch ist und warum Ransomware wirklich jeden treffen kann.

  • 0
  • 0

Actionable threat intelligence: Key to comprehensive security in the healthcare industry

Advances in healthcare technology across the world and in Asia-Pacific have resulted in improved patient care, more accurate diagnostics, faster turnaround times, and a host of other benefits. However, a rise in the number of cyber attacks on the healthcare industry in 2015 has exposed vulnerabilities and risks that were previously not on the radars of many healthcare organizations.

  • 0
  • 0

Calma! Nem todas as ameaças representam sério risco à segurança

Empresas buscam aprimorar inteligência de ameaças para preparar suas equipes sobre novos métodos de ataques e sobre como detê-los

  • 0
  • 0

O modelo de negócios do ransomware

O modelo de negócios por trás do crime mudou. No passado, os agentes maliciosos geralmente lucravam com seus esforços para roubar identidades, ou números de cartões de crédito, e vender os dados no mercado ilegal por um valor baixo.Nos últimos anos, o preço dos registros roubados despencou, caindo de $25 por registro em 2011 para apenas $6 em 2016.

  • 0
  • 0

팔로알토, 차세대 보안 플랫폼 출시

팔로알토 네트웍스가 보안 위협 선제방어를 위한 차세대 보안 플랫폼(Next-Generation Security Platform)에 정보 유출 방지 기능을 대폭 강화한 PAN-OS 7.1버전을 출시했다.

  • 0
  • 0

Ransomware evolui e se estende a outras plataformas

O modelo de negócios por trás do crimeware mudou. No passado, os agentes maliciosos geralmente lucravam com seus esforços para roubar identidades, ou números de cartões de crédito, e vender os dados no mercado ilegal por um valor baixo. Nos últimos anos, o preço dos registros roubados despencou, caindo de US$ 25 por registro em 2011 para apenas US$ 6 em 2016. Isso exigiu novas fontes de renda para os hackers, fazendo com que muitos deles apostassem no ransomware devido aos recentes avanços na distribuição do ataque, pagamentos anônimos e a capacidade de criptografar e descriptografar dados de forma segura

  • 0
  • 0

Ransomware is not a 'malware problem,' it's a criminal business model

As a business model, ransomware has proven to be highly effective in generating revenue for cybercriminals in addition to causing significant operational impact to affected organizations, according to the latest report on malware published by Unit42.

  • 0
  • 0

The Computer Virus That Haunted Early AIDS Researchers

After booting up their computers one day in late March, scores of employees at MedStar, a sprawling health-care system with ten hospitals in the Washington-Baltimore area, were greeted with a menacing ransom note. Their computer systems had been taken over, the note said, and vital files had been locked away. “You have just 10 days to send us the Bitcoin,” the hackers wrote, after demanding about 19,000 dollars’ worth. “After 10 days we will remove your private key and it’s impossible to recover your files.”

  • 0
  • 0

Bucbi Ransomware Gets a Big Makeover

Two-year-old Bucbi ransomware is making a comeback, with new targeted attacks and a new brute force technique.

  • 0
  • 0

Are third party VPN gateways on their way out

In recent years, cybersecurity has emerged as one of the top concerns for business and government leaders around the world. A troubling number of high-profile attacks targeting large companies including banks, telecommunications firms and airlines, to name but a few, has led many IT security managers to question if adequate measures are in place within their own networks. Sophisticated attackers are employing new techniques to penetrate networks and using advanced methodologies to avoid detection.

  • 0
  • 0

Researchers ID 'Infy,' Iranian malware family under the radar for a decade

Palo Alto Networks researchers Tomer Bar and Simon Conant spotted an Iranian malware family, dubbed Infy, which has targeted governments, businesses, and Iranian citizens for nearly a decade.

  • 0
  • 0

次世代ファイアウォールからプラットフォームに――パロアルトネットワークスが大規模な機能強化

 パロアルトネットワークスは4月15日、次世代ファイアウォール製品の最新版ファームウェアのリリースやセキュリティサービスの拡充などを発表した。セキュリティ対策の“プラットフォーム”として企業に訴求するとしている。

  • 0
  • 0

Iran-linked Hackers Used "Infy" Malware in Attacks Since 2007

Researchers at Palo Alto Networks have come across a new malware family that appears to have been used by an Iran-based threat actor in targeted espionage operations since 2007.

  • 0
  • 0

Are You Getting the Most from Your Threat Intelligence Subscription?

The Value of Knowing More About Threats is Limited When it Cannot be Applied to Prevent Threats

  • 0
  • 0

Five steps to protecting industrial Internet of Things infrastructure

The Internet of Things (IoT) is ushering in a fourth wave of the industrial revolution, with multiple industries such as manufacturing and healthcare leveraging connected devices to better manage industrial control systems (ICSs). However, this new capability also raises new security concerns, and companies need to take measures to address them.

  • 0
  • 0