Remove Encryption Remove Malware Remove Penetration Testing Remove System Administration
article thumbnail

A member of the FIN7 group was sentenced to 10 years in prison

Security Affairs

The Ukrainian national Fedir Hladyr (35), aka “das” or “AronaXus,” was sentenced to 10 years in prison for having served as a manager and systems administrator for the financially motivated group FIN7 , aka Carbanak. Between 2014 and 2016 the group used a new custom malware dubbed Carbanak that is considered a newer version of Anunak.

article thumbnail

Top 12 Cloud Security Best Practices for 2021

eSecurity Planet

What are the results of the provider’s most recent penetration tests? Does the provider encrypt data while in transit and at rest? A defense-in-depth strategy that includes firewalls, anti-malware, intrusion detection, and access control has long been the standard for endpoint security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FIN7 sysadmin behind “billions in damage” gets 10 years

Malwarebytes

Hladyr is the systems administrator for the FIN7 hacking group, and is considered the mastermind behind the Carbanak campaign , a series of cyberattacks said to stolen as much as $900 million from banks in early part of the last decade. The malware. The campaigns all started with spear-phishing targeted at bank employees.

article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

The certification covers active defense, defense in depth, access control, cryptography, defensible network architecture and network security, incident handling and response, vulnerability scanning and penetration testing, security policy, IT risk management, virtualization and cloud security , and Windows and Linux security.

article thumbnail

New Linux/DDosMan threat emerged from an evolution of the older Elknot

Security Affairs

The popular expert unixfreaxjp analyzed a new China ELF DDoS’er malware tracked as “Linux/DDoSMan” that evolves from the Elknot malware to deliver new ELF bot. But what kind of malware is this Elknot Trojan? This malware is an update and reuse from the Elknot’s malware source code.

DDOS 87
article thumbnail

Russian-speaking cybercrime evolution: What changed from 2016 to 2021

SecureList

We also review what pushed cybercriminals to transform their operations into the now well-known malware-as-a-service model — the use of cloud servers, the decreasing relevance of custom malware and the subsequent emergence of small, agile teams. Malware developers — no longer hiring. Client-side attacks on the wane.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Always keep your eyes open to control-rights of the senior IT managers or systems administrators with the authority to configure servers, firewalls, cloud storage, and file-sharing (or another network privilege). You will create cyber awareness among your staff, as well as users, partners, customers.