article thumbnail

Will 2019 Be the Year Cybersecurity Goes Mainstream?

Adam Levin

2019 will be the year consumers start thinking more about cyber hygiene , and the year Congress becomes more proactive in the areas of privacy and cybersecurity. Identity theft has become the third certainty in life after death and taxes, and consumer-friendly solutions to protecting against it will profit nicely in 2019.

article thumbnail

Hacker deleted all data from VFEmail Servers, including backups

Security Affairs

A destructive cyberattack hit the email provider VFEmail, a hacker wiped its servers in the United States, including the backup systems. An unknown attacker has launched a destructive cyber attack against the email provider VFEmail, he erased information on its server including backups, 18 years’ worth of customer emails were lost. “We

Backups 81
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Big Game Ransomware being delivered to organisations via Pulse Secure VPN

DoublePulsar

A security vulnerability in a popular enterprise remote access product is being used to deliver ransomware into organisations , with targeted delivery to also delete backups and disable endpoint security controls. On 14th August 2019 somebody posted an exploit for the issue on my forum, OpenSecurity.global.

VPN 52
article thumbnail

Fileless SockDetour backdoor targets U.S.-based defense contractors

Security Affairs

According to the experts, the SockDetour backdoor has been in the wild since at least July 2019. SockDetour serves as a backup fileless Windows backdoor in case the primary one is removed. based defense contractors. “It is difficult to detect, since it operates filelessly and socketlessly on compromised Windows servers.”

Backups 91
article thumbnail

An Unholy Union: Remote Access and Ransomware

Approachable Cyber Threats

During the COVID-19 pandemic for example, you may use a Virtual Private Network (VPN) to connect to your organization’s network as if you’re sitting in the office, or you might use Remote Desktop Protocol (RDP) to connect to your computer that’s now collecting dust on your office desk. VPNs continue to be problematic as well.

article thumbnail

Lessons from a real-life ransomware attack

Malwarebytes

Sadly, there’s rarely discussion about the lengthy recovery, which, according to the Ransomware Task Force, can last an average of 287 days , or about the complicated matter that the biggest, claimed defense to ransomware attacks—backups—often fail. Your backups may not work. The first few hours are critical. Or so he thought. “We

article thumbnail

China-linked threat actors have breached telcos and network service providers

Security Affairs

Enforce MFA on all VPN connections [ D3-MFA ]. Perform regular data backup procedures and maintain up-to-date incident response and recovery procedures. If MFA is unavailable, enforce password complexity requirements [ D3-SPP ].