article thumbnail

eSecurity Planet’s 2022 Cybersecurity Product Awards

eSecurity Planet

The editors of eSecurity Planet have been giving advice to enterprise security buyers for more than a decade, and for the last five years we’ve been rating the top enterprise cybersecurity products, compiling roughly 50 lists to date on every product imaginable, from networks to endpoints and out to the cloud and beyond.

article thumbnail

New MSSQL Backdoor ‘Maggie’ Infects Hundreds of Servers Worldwide

eSecurity Planet

DCSO CyTec researchers Johann Aydinbas and Axel Wauer are warning of new backdoor malware they’re calling “Maggie,” which targets Microsoft SQL servers. The malware offers a wide range of functionality, including the ability to change file permissions, run commands, and act as a network bridge into the infected server.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Impacts of Data Loss on Your Organization

Security Affairs

Examples: Customer Personal Identifiable Information, transactional data, inventory records, and financial statements. Unstructured Data: Unstructured data, on the other hand, is characterized by its lack of organization and predefined format. Cyber Attacks: Cyber-attacks are another cause of data loss.

article thumbnail

Cooking Intelligent Detections from Threat Intelligence (Part 6)

Anton on Security

In essence, TI plays a pivotal role in bridging the gap between understanding and action in the cybersecurity realm. Threat intelligence (TI) originates from diverse sources, necessitating a structured approach to enrichment and comparison by TI analysts before integration into the cybersecurity pipeline.

article thumbnail

How Can You Protect Critical Infrastructure from Ransomware Attacks

Thales Cloud Protection & Licensing

Indeed this cyberattack has gotten the attention at the highest levels, with the White House issuing an Executive Order on improving the nation’s cybersecurity. The malware can then compromise the victim’s system by encrypting all the files on their hard drive, and then post a ransom note to pay-up and gain back access to their files.

article thumbnail

Cooking Intelligent Detections from Threat Intelligence (Part 6)

Security Boulevard

In essence, TI plays a pivotal role in bridging the gap between understanding and action in the cybersecurity realm. Threat intelligence (TI) originates from diverse sources, necessitating a structured approach to enrichment and comparison by TI analysts before integration into the cybersecurity pipeline.

article thumbnail

How security professionals will rise to the challenge of cyber defense in 2022

CyberSecurity Insiders

Thankfully, cybersecurity professionals everywhere are working on inventing new tech and improving upon legacy technology solutions to maintain pace with these criminals who threaten our data security. Learn more about what security leaders have to say about the upcoming year below: Neil Jones, cybersecurity evangelist, Egnyte.