


Dan Panesar
Director UK & Ireland /*=$expert->feature_status*/ ?>
Securonix
Comments Dotted :
8
November 12, 2020
As we move in to 2021 we will continue to see ‘big game’ ransomware attacks continue.
As we move into 2021 we will continue to see ‘big game’ ransomware attacks continue. Often the actual ransomware attack isn’t the primary infection, generally there is an initial campaign and infection followed by a stealth period while the attacker probes and looks for vulnerabilities to exploit. This can be weeks, sometimes months before an exploit is found or an escalation of privileges can happen. This gives an organisation a ‘window’ of opportunity to be able to spot an.....Read More

September 08, 2020
Cyber criminals will continue to target banks as they simply follow the money, with most of the attacks financially motivated.
Ransomware is particularly devastating as it’s easy to deploy and can be very effective. Cyber criminals will continue to target banks as they simply follow the money, with most of the attacks financially motivated. Unfortunately there is no easy answer when it comes to stopping this type of attack. In today's security landscape, even financial organisations and their security teams are outgunned by the attackers in terms of resources and skills. Security teams need to spend less time.....Read More

August 18, 2020
Security teams need to spend less time managing the systems and more time addressing the threats.
The Carnival data breach is particularly nasty as the hackers have gained access and stolen the ‘holy grail’ of information, including personal details, credit cards and social security numbers; all the essentials to perform some pretty nasty identity fraud on its customers. It appears the attackers have used the classic diversion of a ransomware attack to divert attention to the real focus of the attack, which was to steal valuable and sensitive data.
In today's security landscape,.....Read More

August 17, 2020
Although no credit card details seem to be included in the stolen data, hackers still have huge amounts of personal details.
The Ritz Hotel is notifying customers that it’s food and beverage booking system has been compromised. Such a highly prestigious hotel will likely have some high profile clients information stored on this system. It’s not known how the data was accessed and details are still emerging. Although no credit card details seem to be included in the stolen data, hackers still have huge amounts of personal details, contact details, and of course the details of reservations. Fears must be that.....Read More

July 29, 2020
Organisations and their security teams are out gunned by today's attackers in terms of resources and skills.
The reported Drizly data breach is interesting as it shows clearly just how long the attacker was able to have access to Drizly’s internal systems without being noticed. We call this the 'detection gap' — the time between an initial breach and the victim noticing it. The stolen data appears to have been available since February, but the breach was only identified by Drizly on July 13 and reported to customers earlier this week
That is a two-week delay between identifying the breach and.....Read More

July 16, 2020
The complexity of internal systems within organisations presents a vastly increased attack surface.
The Twitter hack looks a classic case of insider threat. The insider’s behaviour can be malicious, complacent, or ignorant, which in turn amplifies the impact to the organisation resulting in monetary and reputation loss. Using traditional technologies – such as data loss prevention( DLP) tools, privileged access management (PAM) solutions, and other point solutions – is not sufficient to detect insider threat behaviour today. The complexity of internal systems within organisations.....Read More

July 15, 2020
it is critical to give security teams the visibility into the user behaviour to quickly spot what isn’t 'normal’ and take steps to remediate
Educating users is one way to help stop these types of attacks but, as we too often see, users will always be the weakest link in any organisation's security posture. Too often these type of malware and phishing attacks breach defences, so what organisations really need is the ability to proactively detect and respond to abnormal user behaviour in a fast and scalable way, thus removing the human element completely. Furthermore, as we see more advanced malware, it is critical to give security.....Read More

July 07, 2020
It is important to remember that even though you rely on an MSP or MSSP, you are still culpable for the information that you own.
Enterprises have been hard at work modernizing their infrastructure and transitioning to the digital world to provide better, faster, and economically more efficient services to their constituents. As a result of this transformation, they become increasingly vulnerable to cybercriminals looking for softer targets to attack; and unfortunately, they often are softer.
Transitioning to cloud services and utilizing MSSP (Managed Security Service Provider) with vertical-specific expertise is.....Read More
