Wednesday, July 5, 2017

NotPetya shows rising threat of sophisticated ransomware attacks

Security Digest
Information security news and advice from TechTarget's network | July 5, 2017
TechTarget
FEATURED STORY
NotPetya ransomware trend moving towards sophistication
by Michael Heller, Senior Reporter

NotPetya represented advanced malware compared to its cousin WannaCry, but also showed sophistication that experts worry may be a ransomware trend. (SearchSecurity.com)

Advertisement
NEWS
 
Petya ransomware scam: Lost files can't be restored

Researchers discovered the rash of Petya-like attacks are nothing more than a ransomware scam, and list files are impossible to restore. (SearchSecurity.com)

 
Q&A: How the Cyber Threat Alliance solved threat intelligence sharing

Palo Alto Networks CSO Rick Howard talks with SearchSecurity about his experiences with the Cyber Threat Alliance and how the group approaches threat intelligence sharing. (SearchSecurity.com)

 
 
 

The ELSA project enables hackers to track and store geolocation data

News roundup: The ELSA project -- one of the released CIA hacking tools -- can track device locations. Plus, Senators move to ban Kaspersky Lab products from the military, and more. (SearchSecurity.com)

 
Risk & Repeat: RNC voter database left open to the public
In this week's Risk & Repeat podcast, SearchSecurity editors discuss how the Republican National Committee's voter database was accidentally exposed in an Amazon S3 bucket. (SearchSecurity.com)
 
 
 
EXPERT ADVICE
 
Incorporating static source code analysis into security testing

Static source code analysis, along with dynamic analysis and pen testing, can help strengthen your application security. Expert Kevin Beaver goes over the features to look out for. (SearchSecurity.com)

 
Discover the best patch management software for your business
Keeping your applications updated and patched is essential for company security. Patch management software can help you do that efficiently, but which one is best for you? (SearchSecurity.com)
 
 
 
 

Continuous monitoring in the cloud: Two steps to make it a reality

Enterprises can achieve continuous monitoring in the cloud if they focus on the two main elements of it. Expert Dave Shackleford discusses what those elements are. (SearchCloudSecurity.com)

 
How does the Antbleed backdoor vulnerability work?

Antbleed, a backdoor vulnerability, was discovered in bitcoin mining equipment. Expert Matthew Pascucci explains how the Bitmain flaw works and how it can be prevented. (SearchSecurity.com)

 
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved.
TechTarget

No comments: