Remove 2011 Remove Backups Remove Encryption Remove Firewall
article thumbnail

Copycat Criminals mimicking Lockbit gang in northern Europe

Security Affairs

Despite not being the true LockBit Locker group, these micro criminals were still able to cause significant damage by encrypting a large number of internal files. However, the company was able to restore its network from backups and no client workstations were affected during the intrusions.

article thumbnail

Dridex malware, the banking trojan

CyberSecurity Insiders

Introduction: Dridex, also known as Cridex or Bugat, is a banking Trojan that has been active since 2011. The malware also uses basic string encryption to hide the malicious URL it connects to in order to retrieve a file. Regular backups: Regularly backup important data and keep backups in a secure location.

Banking 78
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best Enterprise VPN Solutions for 2021

eSecurity Planet

VPNs offer clients an encrypted access channel to remote networks through a tunneling protocol and can obfuscate the client’s IP address. Founded in 2011, CyberGhost VPN is headquartered in Bucharest, Romania, and boasts over 30 million global customers. Also Read: Tokenization vs. Encryption: Pros and Cons. Encrypt.me.

VPN 57
article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Security services and tools include anti-DDoS , SOCaaS , web application firewalls (WAF), data encryption , and more. Also Read: Top Web Application Firewall (WAF) Vendors. Other features include applying secure socket layer (SSL) or transport layer security (TLS) and AES-256 encryption. Amazon Web Services (AWS).

Firewall 106
article thumbnail

WastedLocker: A New Ransomware Variant Developed By The Evil Corp Group

Fox IT

We have tracked the activities of the Evil Corp group for many years, and even though the group has changed its composition since 2011, we have been able to keep track of the group’s activities under this name. WastedLocker aims to encrypt the files of the infected host. Attribution and Actor Background. Actor Tracking.