Windows Hello for Business Opens Door to New Attack …
Tuesday, 19 November 2019
Researchers exploring Windows Hello for Business found an Active Directory backdoor and other attack vectors that could lead to privilege escalation. Researchers investigating Microsoft’s Windows Hello for Business have discovered new attack vectors, including a persistent Active Directory backdoor that they say current security tools don’t detect. Windows Hello for Business (WHfB) was introduced in
- Published in Threats, Threats Analysis
7 Comments
Florida City Ransom Payment Could Open Door to More Attacks
Friday, 21 June 2019
Riviera Beach’s decision to pay ransom to criminals might get files back, but it almost guarantees greater attacks against other governments. Paying the ransom for ransomware is rarely recommended, but that didn’t stop Riviera Beach, Florida — a town with a population of around 35,000, north of West Palm Beach — from authorizing a payment
- Published in Strategies
Florida City Ransom Payment Could Open Door to More …
Friday, 21 June 2019
Riviera Beach’s decision to pay ransom to criminals might get files back, but it almost guarantees greater attacks against other governments. Paying the ransom for ransomware is rarely recommended, but that didn’t stop Riviera Beach, Florida — a town with a population of around 35,000, north of West Palm Beach — from authorizing a payment
- Published in Attacks
Confluence Vulnerability Opens Door to GandCrab
Wednesday, 01 May 2019
An exploit of the vulnerability offers attackers a ransomware surface that doesn’t need email. A vulnerability in a popular devops tool could leave companies with a dose of ransomware to go with their organizational agility. That’s the warning coming from researchers at Trend Micro and Alert Logic as they explain how the vulnerability in Atlassian
- Published in Strategies
Are You Leaving the Wired Network Door Wide Open?
Friday, 19 April 2019
Most organizations lock down Wi-Fi access but rely on physical security and static segmentation as the primary defensive technique for the wired network. This blog is the first in a 3-part series that explores why this practice is commonplace today, the risks of this approach, and what alternatives exist. Let me start by telling you
- Published in Strategies