Tag Archive for: review

Elevate Your Ransomware Defenses with a Post Incident Review


When a military mission is completed, commanders create what’s commonly known as an “after-action review” to assess what happened versus what was intended to happen. These reviews are designed to determine what went right and what needs improvement before the next mission.

Such reviews are critical in the armed forces, and they also are key tools that IT and business leaders can use to evaluate how organizations performed in response to ransomware attacks and other cybersecurity incidents. These assessments can help organizations determine how attacks occurred, what the response was like, and how to improve cybersecurity efforts and post-incident communications, according to industry experts.

The need for such reports is as critical as ever. According to IBM’s X-Force Threat Intelligence Index 2023, ransomware was the second-most common action malicious actors took in 2022, covering 17 percent of attacks (behind only the use of malware backdoors at 21 percent).

And according to a 2023 Cybersecurity Ventures report, “by 2031, ransomware attacks are expected to occur every 2 seconds” and carry a global cost of about $265 billion. “You want to be able to look at what the root cause was and try to get to lessons learned in terms of continuous improvement,” says Rob Clyde, an ISACA board director.

 

Creating a Post-Incident Ransomware Review

It’s crucial for business and IT leaders to hold multiple post-incident review meetings to discuss what happened during a ransomware attack, says Jon France, CISO of (ISC)², a nonprofit cybersecurity association. Leaders can use these meetings not only to determine how an attack occurred and what broke down in terms of cybersecurity but also look at what went right so that good behaviors and best practices can be reinforced.

The most important part of these reviews is to get to the truth of what happened. Without that, organizations won’t know how to improve, says Lisa Plaggemier, executive director of the National Cybersecurity Alliance. She says it’s important for post-incident reviews to include individuals within an organization who were on the front lines when an attack occurred, because they…

Source…

Blackhat (2015) – Film Review, Good cyber thriller, great extras,


blackhat film review bluray

Director: Michael Mann
Cast: Chris Hemsworth, Viola Davis, Tang Wei
Certificate: 15

By Roger Crow

Cyber thrillers can fall flat if they slip into the realms of cliché, but thankfully Blackhat, now released on super hi-def 4K UHD, gets the cardinal sin out the way early: assorted close-up tracking shots of data transfer through chips and microscopic tech landscapes.

Chris Hemsworth is terrific as Nicholas Hathaway, the ace hacker released from prison to help the US government find the villain responsible for a nuclear power plant meltdown in Hong Kong.

Chicago’s Mercantile Trade Exchange is also hacked, causing soy futures to soar. Okay, less urgent but relevant to the plot, which was reminiscent of 007 epic A View To A Kill.

With the aid of Nicholas’s old mate, Captain Chen Dawai, a military officer in China’s cyber warfare unit, and his sister Lien, they set off with Hathaway to find their man.

blackhat film review coverHathaway is the world’s least likely hacker seeing as he looks like a Norse god, but it scarcely matters; viewers will be just itching for the moment he beats up a bunch of assailants in a restaurant.

“Not perfect”

The first act is nothing special as director Michael Mann sets out his stall and lets his tale unfold.

Viola Davis is okay as FBI Agent Carol Barrett, the figure of authority keeping an eye on Hathaway and slowly developing respect for him. (There’s a back story about 9/11 shoehorned in to give her a little depth, but she does rather well in a generic role).

Tang Wei, who plays our hero’s love interest, is good not great. I’d have preferred Maggie Q or Gong Li in the role, but she looks nice, while the action scenes are okay.

A shootout at a dockside dragged on a bit, but thankfully not as long as the one in Mann’s Heat.

For me, Michael Mann peaked with 1992’s The Last of the Mohicans, but this is possibly his best work since then.

It’s not perfect. There was some confusion over a character’s death in the second act, possibly intentional, and an incendiary scene was framed like many exploding car shots: long shot, characters on the left,…

Source…

Week in review: MOVEit Transfer critical zero-day vulnerability, Kali Linux 2023.2 released


Week in review

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos:

MOVEit Transfer zero-day attacks: The latest info
Progress Software has updated the security advisory and confirmed that the vulnerability (still without a CVE number) is a SQL injection vulnerability in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer’s database.

Penetration tester develops AWS-based automated cracking rig
Building a custom cracking rig for research can be expensive, so penetration tester Max Ahartz built one on AWS. In this Help Net Security interview, he takes us through the process and unveils the details of his creation.

The strategic importance of digital trust for modern businesses
In this Help Net Security interview, Deepika Chauhan, CPO at DigiCert, talks about the importance of maintaining high trust assurance levels for businesses in today’s digital landscape.

Navigating cybersecurity in the age of remote work
In this Help Net Security interview, Jay Chaudhry, CEO at Zscaler, talks about connecting and securing remote employees and their devices to access organizational resources from any location.

Threat actors can exfiltrate data from Google Drive without leaving a trace
Google Workspace (formerly G Suite) has a weak spot that can prevent the discovery of data exfiltration from Google Drive by a malicious outsider or insider, Mitiga researchers say.

Zyxel firewalls under attack by Mirai-like botnet
CVE-2023-28771, the critical command injection vulnerability affecting many Zyxel firewalls, is being actively exploited by a Mirai-like botnet, and has been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog.

Someone is roping Apache NiFi servers into a cryptomining botnet
If you’re running an Apache NiFi instance exposed on the internet and you have not secured access to it, the underlying host may already be covertly cryptomining on someone else’s behalf.

Kali Linux 2023.2 released: New tools, a pre-built Hyper-V image, a new audio stack, and more!
Offensive Security has released Kali Linux 2023.2, the latest version of its popular penetration testing…

Source…

Norton Antivirus Review 2023: Pricing, Pros & Cons – Forbes … – Forbes



Norton Antivirus Review 2023: Pricing, Pros & Cons – Forbes …  Forbes

Source…