Kostenlose Sophos ZTNA-Lizenzen für Kunden der Sophos Firewall

Credit to Author: Jörg Schindler| Date: Sun, 11 Aug 2024 06:47:09 +0000

Sophos ZTNA bietet sicheren Zugriff auf Netzwerk-Anwendungen, RDP-Systeme und Web-Management-Konsolen. ZTNA bietet beim Remote-Zugriff viele Vorteile: bessere Sicherheit, mehr Benutzerfreundlichkeit und komplette Transparenz für Endanwender. Mit diesen kostenlosen 1-Jahres-Lizenzen können Kunden der Sophos Firewall das ab Version 19.5 MR3 in jede Firewall integrierte ZTNA-Gateway nutzen und die Vorteile von ZTNA kennenlernen. Sie können die Lizenzen nach […]

Read more

Ransomware-Gruppen erhöhen Druck auf Zahlungsunwillige

Credit to Author: Jörg Schindler| Date: Thu, 08 Aug 2024 05:53:48 +0000

Sophos beschreibt im neuen Dark-Web-Report “Turning the Screws: The Pressure Tactics of Ransomware Gangs” detailliert, wie Cyberkriminelle gestohlene Daten als Mittel einsetzen, um den Druck auf zahlungsunwillige Zielpersonen zu erhöhen. Zu den Druckmitteln gehören die Weitergabe von Kontaktdaten, das Veröffentlichen von Informationen über Familienmitglieder von CEOs und Geschäftsinhabern oder die Drohung, Informationen über illegale Geschäftsaktivitäten, […]

Read more

Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files

Credit to Author: Microsoft Threat Intelligence| Date: Tue, 29 Oct 2024 19:00:00 +0000

Since October 22, 2024, Microsoft Threat Intelligence has observed Russian threat actor Midnight Blizzard sending a series of highly targeted spear-phishing emails to individuals in government, academia, defense, non-governmental organizations, and other sectors. This activity is ongoing, and Microsoft will continue to investigate and provide updates as available. Based on our investigation of previous Midnight […]

The post Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files appeared first on Microsoft Security Blog.

Read more

Attacker Abuses Victim Resources to Reap Rewards from Titan Network

Credit to Author: Ranga Duraisamy| Date: Wed, 30 Oct 2024 00:00:00 +0000

In this blog entry, we discuss how an attacker took advantage of the Atlassian Confluence vulnerability CVE-2023-22527 to connect servers to the Titan Network for cryptomining purposes.

Read more

Cybercriminals Pose a Greater Threat of Disruptive US Election Hacks Than Russia or China

Credit to Author: Lily Hay Newman, Dell Cameron| Date: Mon, 28 Oct 2024 13:00:00 +0000

A report distributed by the US Department of Homeland Security warned that financially motivated cybercriminals are more likely to attack US election infrastructure than state-backed hackers.

Read more

Chinese Hackers Target Trump Campaign via Verizon Breach

Credit to Author: Lily Hay Newman, Andy Greenberg| Date: Sat, 26 Oct 2024 10:30:00 +0000

Plus: Apple offers $1 million to hack its AI cloud infrastructure, Iranian hackers successfully peddle stolen Trump campaign docs, Russia hacks the nation of Georgia, and a “cyberattack” that wasn’t.

Read more