article thumbnail

Russia-linked Cyclops Blink botnet targeting ASUS routers

Security Affairs

The group is also the author of the NotPetya ransomware that hit hundreds of companies worldwide in June 2017, causing billions worth of damage. Experts pointed out that these victims do not appear to be evidently valuable targets for either economic, military, or political espionage. ” reads the advisory published by TrendMicro.

IoT 97
article thumbnail

MY TAKE: DigiCert and Oracle partner to extend digital trust and scalable infrastructure globally

The Last Watchdog

Here are a few of my takeaways: Seeds of the partnership In 2017, DigiCert acquired and commenced reviving Symantec’s PKI business. This was all part of the Lehi, Utah-based vendor’s efforts to support enterprise cloud migration and the rise of IoT systems, which were both gaining steam.

Cloud 195
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breaking the Ice on DICE: scaling secure Internet of Things Identities

The Security Ledger

In this Spotlight Podcast, sponsored by Trusted Computing Group*, Dennis Mattoon of Microsoft Research gives us the low-down on DICE: the Device Identifier Composition Engine Architectures, which provides a means of solving a range of security and identity problems on low cost, low power IoT endpoints. Among them: establishing strong device.

IoT 40
article thumbnail

Federal Agency Data is Under Siege

Thales Cloud Protection & Licensing

Originally Featured in Global Military Communications Magazine’s June/July Issue. Question: According to the report, in the past year, 57 percent of federal respondents experienced a data breach, compared with 34 percent in 2017 and 18 percent in 2016. What can you tell us about these breaches, and why are they becoming so prolific?

article thumbnail

Ransomware Protection in 2021

eSecurity Planet

Through the years, we’ve seen several strains of ransomware make headlines: CryptoLocker in 2013, Locky in 2016, WannaCry and Hermes in 2017, GandCrab in 2018, and now, Ryuk joins the pack of notable names in criminal malware. Increased attacks on individuals with high net value and Internet of Things (IoT) devices ( McAfee ).

article thumbnail

NEW TECH: CyCognito employs offensive bot network to put companies a step a head of attackers

The Last Watchdog

Related :Promise vs. pitfalls of IoT For small- and mid-sized businesses, firewalls, antivirus suites and access management systems represent the entry stakes for participating in today’s digital economy. One of the most single-minded of these security vendors is startup CyCognito.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

In January 2017, seeking to provide practical advice for directors to address their oversight responsibilities, the National Association of Corporate Directors (NACD) released its (revised) Handbook on Cyber-Risk Oversight (NACD Handbook). Designing an Enterprise-Level Approach. Mandatory Access Control. Role-Based Access Control.