Securing the MSP: best practices for vetting cybersecurity vendors

Credit to Author: William Tsing| Date: Wed, 11 Mar 2020 15:44:33 +0000

How do you spot the unicorn cybersecurity vendors amongst the bad apples? We show MSPs the ins and outs of vendor vetting.

Categories:

Tags:

(Read more…)

The post Securing the MSP: best practices for vetting cybersecurity vendors appeared first on Malwarebytes Labs.

Read more

A Deep Dive Into Wakeup On Lan (WoL) Implementation of Ryuk

Credit to Author: Goutam Tripathy| Date: Thu, 13 Feb 2020 09:57:14 +0000

Quick Heal Security Labs recently came across a variant of Ryuk Ransomware which contains an additional feature of identifying and encrypting systems in a Local Area Network (LAN). This sample targets the systems which are present in sleep as well as the online state in the LAN. This sample is packed with…

Read more

Ako Ransomware targeting businesses using RaaS

Credit to Author: Shriram Munde| Date: Fri, 24 Jan 2020 11:00:51 +0000

Ako Ransomware targeting businesses using RaaS Quick Heal security researchers recently observed ransomware that uses RaaS (Ransomware as a Service) which is a subpart of MaaS (Malware as a Service). Before delving into the AKO ransomware or RaaS, one must understand what Malware as a Service means, as it is…

Read more

Making the case: How to get the board to invest in higher education cybersecurity

Credit to Author: Joan Goodchild| Date: Wed, 28 Aug 2019 17:31:00 +0000

CISOs working in institutions of higher learning have their own considerations when communicating with the board about risk management. One of the top security officials at Boston College offers his takeaway on what it takes to get board buy-in on campus.

Categories:

Tags:

(Read more…)

The post Making the case: How to get the board to invest in higher education cybersecurity appeared first on Malwarebytes Labs.

Read more

Enterprise incident response: getting ahead of the wave

Credit to Author: William Tsing| Date: Wed, 10 Jul 2019 14:19:31 +0000

As with traditional warfare, beating back attacks and winning depends on having a plan. Here are several incident respond models security researchers have developed for responding to threats.

Categories:

Tags:

(Read more…)

The post Enterprise incident response: getting ahead of the wave appeared first on Malwarebytes Labs.

Read more