Wednesday, May 27, 2020

New ransomware attack methods; Plus, when will mobile voting be secure?

 
Security Digest
Information security news and advice from TechTarget's network |May 27, 2020
TechTarget
FEATURED STORY
Ragnar Locker ransomware attack hides inside virtual machine

by Alexander Culafi, News Writer

Threat actors have developed a new type of attack method by hiding Ragnar Locker ransomware inside a virtual machine to avoid detection.

Advertisement
NEWS
 
Risk & Repeat: When will mobile voting be ready?

This Risk & Repeat podcast examines the rise of mobile voting apps and how security experts have expressed concerns about the risks of deploying the technology for elections.

 
Mandiant dishes on notorious Maze ransomware group
Mandiant threat researchers navigate the tools, tactics and procedures of the Maze ransomware group, which has become notorious for "shaming" victims with stolen data.
 
Forescout sues Advent for calling off acquisition

Forescout Technologies filed a lawsuit against Advent International, claiming the private equity firm violated the terms of its $1.9 billion acquisition agreement.

 
Android security vulnerabilities differ by country, say researchers
Manufacturers of Android devices, including Huawei, Samsung and Xiaomi, shipped devices with different levels of security in different regions, leaving their users exposed to attacks.
EXPERT ADVICE
 
Comparing top identity and access management certifications

In addition to learning security fundamentals applicable to identity and access management, the top IAM certifications can yield rewarding career and networking opportunities.

 
CCSK cert guide author's insights into cloud security credential
The author of a Certificate of Cloud Security Knowledge exam guide offers insights into certifications, top considerations for those pursuing the CCSK and more.
 
IT and security teams collide as companies work from home
The new world of remote work has given rise to IT and security teams working more closely than ever before. They need to come together to provide excellent UX and security.
 
Post-COVID-19 CISO priorities changing for 2020

CISO priorities for 2020 were upended when the COVID-19 pandemic hit. Learn two ways forward-thinking CISOs are planning to deal with the new normal.

 
Use these CCSK practice questions to prep for the exam
Virtualization and container security are key topics in the Certificate of Cloud Security Knowledge credential. Test your knowledge with these CCSK practice questions.
 
Multicloud storage 101: Pros, cons, pitfalls and strategies
Not putting all your eggs in one basket can be helpful to an enterprise's resilience strategy. Learn more about at the benefits and pitfalls of multicloud storage.
About This E-Newsletter
The Security Digest is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2020 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: