Cyberattacks are Prominent in the Russia-Ukraine Conflict

Credit to Author: Trend Micro Research| Date: Thu, 03 Mar 2022 00:00:00 +0000

Alongside the physical conflict happening between Russia and Ukraine, there have also been an increasing number of alleged cyberattacks perpetrated by different groups. Our research teams have verified and validated internal data and external reports to provide accurate information that can be used to strengthen defenses against these attacks. We will continuously update this blog with validated threats as more events unfold.

Read more

Splunk appoints Gary Steele as new CEO

Credit to Author: Scott Carey| Date: Thu, 03 Mar 2022 03:12:00 -0800

Splunk has named Gary Steele as its new CEO, three months after the surprise resignation of longtime CEO Doug Merritt.

“The board is focused on identifying a leader with a proven track record of scaling operations and growing multi-billion-dollar enterprises,” Merritt said in a statement at the time.

We now know that leader is Gary Steele, who was the founding CEO of software-as-a-service (SaaS) security vendor Proofpoint, a company he led for nearly 20 years. During that time, Steele navigated both an IPO in 2012 and a private equity buyout from Thoma Bravo last year. He will start on April 11, when he will also take a seat on Splunk’s board.

To read this article in full, please click here

Read more

Four SMB cybersecurity practices during geopolitical upheaval

Credit to Author: David Ruiz| Date: Thu, 03 Mar 2022 10:37:29 +0000

In a time of rapid-changing crisis, here are four SMB cybersecurity best practices to help prevent the most common attacks.

The post Four SMB cybersecurity practices during geopolitical upheaval appeared first on Malwarebytes Labs.

Read more

Global Cyberattacks Tied to the Russian Invasion of Ukraine


Cyber-risk management and security fundamentals are the key to cyber-resilience. 5 best practices to manage your cyber risk.

Read more

5 Cloud Native Security Platform Must-haves

Credit to Author: Melanie Tafelski| Date: Wed, 02 Mar 2022 00:00:00 +0000

Discover 5 key security components to review and how to leverage a cloud native security platform with Mick McCluney (Trend Micro) and Kelly Griffin (AWS).

Read more

Conti Ransomware Group Diaries, Part II: The Office

Credit to Author: BrianKrebs| Date: Wed, 02 Mar 2022 17:49:52 +0000

Earlier this week, a Ukrainian security researcher leaked almost two years’ worth of internal chat logs from Conti, one of the more rapacious and ruthless ransomware gangs in operation today. Tuesday’s story examined how Conti dealt with its own internal breaches and attacks from private security firms and governments. In Part II of this series we’ll explore what it’s like to work for Conti, as described by the Conti employees themselves.

Read more