Medical data: Accessible and irresistible for cyber criminals

How valuable is personal healthcare data? Apparently it depends. Based on at least some price comparisons on the Dark Web – the underground online marketplace for cyber criminals – electronic health records (EHR) are not even close to premium goods. McAfee, now a division of Intel Security, reported recently that the price for an individual medical…

Highly lucrative Ransomware as a Service attacks poised to accelerate in 2017

Ransomware can be likened to global warming. It’s been around for years, but it’s now becoming an epidemic which needs serious attention. According to a recent survey conducted by Osterman Research, nearly 50% of U.S. companies experienced a “ransomware incident” over the last year. Without taking into account the number of unreported ransomware incidents, the…

GDPR Compliance Regulations: The New Challenge for the Cloud Operations Manager

In December 2015, the European Union (EU) announced a framework designed to combine the various data protection laws throughout the region. The General Data Privacy Regulation (GDPR) impacts many industries, from coffee shops to football clubs. It essentially affects any institution that retains personal information, especially businesses that store or handle data in multiple countries….

Nagios 4.2.4 closes serious root privilege escalation bug

If you’re using Nagios to monitor your systems, networks and infrastructure, and you have not updated to version 4.2.4, you better hop to it. This latest release fixes a high severity root privilege escalation vulnerability (CVE-2016-9566) discovered by researcher Dawid Golunski, who published a proof-of-concept exploit for it on Thursday.

Fighting Advanced Ransomware Attacks Requires Game-Changing Technology

Ransomware is one of the fastest-growing cyber-security threats facing organizations and individuals today. Attackers are holding everything from government records to health care equipment and even the keys to entire transit systems for ransom. According to new data from IBM, victims are paying up. More than half of the business executives that responded to the…

Goldeneye Ransomware – the Petya/Mischa combo rebranded

From March 2016 we’ve observed the evolution of an interesting low-level ransomware, Petya – you can read about it here. The second version (green) Petya comes combined with another ransomware, packed in the same dropper – Mischa. The latter one was deployed as an alternative payload: in case if the dropper was run without administrator…