#BHEU: Zero Trust Protects Against Ransomware, Claims Engineer

#BHEU: Zero Trust Protects Against Ransomware, Claims Engineer “A zero trust architecture can protect against ransomware” was the resounding claim made by Ben Jenkins, senior solutions engineer at ThreatLocker, during…

Lazarus Hacking Group Now Focusing on IT Supply Chain Attacks

Lazarus Group, the Advanced Persistent Threat (APT) hacking group linked to the North Korean government, has shifted its attention to new targets, with cybersecurity researchers noticing that the actor is…

GCHQ Boss: Ransomware Has Doubled in a Year

GCHQ Boss: Ransomware Has Doubled in a Year The volume of ransomware attacks on UK organizations has doubled over the past year, a British spy chief has warned. Director of…

Windows security: 20 years on from Bill Gates' Trustworthy Computing memo, how much has changed?

It’s almost 20 years since then-Microsoft boss Bill Gates wrote his famous Trustworthy Computing memo, in which he urged the company to produce more secure software.  “Eventually, our software should…

New guidelines for responding to cyber attacks don’t go far enough

Padlokr –  Padlokr –  If Australia’s electricity grid was targeted by cyber attack the fall out could be severe. Shutterstock Adam Henry, UNSW and Greg Austin, UNSW Debates about cyber…

Cyber spies for hire: efforts to control cyber weapons ignore the agents who use them

Padlokr –  Padlokr –  Maksim Shmeljov/Shutterstock Alexi Drew, King’s College London Reports of malicious and targeted cyber attacks are becoming increasingly common around the world. In early February, for example,…

Government cybersecurity commission calls for international cooperation, resilience and retaliation

Padlokr –  Padlokr –  Real-time cyberattacks on a display at the 175th Cyberspace Operations Group of the Maryland Air National Guard. U.S. Air Force photo by J.M. Eddins Jr., CC…

Patching Too Tortuous for IT Pros

Patching Too Tortuous for IT Pros Patching vulnerabilities is too labor intensive and convoluted a process for most IT security professionals, according to new research by Ivanti.  The Utah-based software company surveyed over…

The Top Ransomware Threats Aren’t Who You Think

Move over REvil, Ragnar Locker, BlackMatter, Conti et al: Three lesser-known gangs account for the vast majority of ransomware attacks in the U.S. and globally. While there seem to be…

Is Australia a sitting duck for ransomware attacks? Yes, and the danger has been growing for 30 years

Padlokr –  Padlokr –  Paul Haskell-Dowland, Edith Cowan University and Andrew Woodward, Edith Cowan University Australian organisations are a soft target for ransomware attacks, say experts who yesterday issued a…