article thumbnail

LockFile Ransomware uses a new intermittent encryption technique

Security Affairs

This trick can be successful against ransomware detection software that relies on inspecting content using statistical analysis to detect encryption.” ransomware: The victims of the Lockfile ransomware gang are in the manufacturing, financial services, engineering, legal, business services, and travel and tourism sectors.

article thumbnail

The Week in Cyber Security and Data Privacy: 30 October – 5 November 2023

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Brown, with fraud and internal control failures relating to its cybersecurity practices. Welcome to this week’s round-up of the biggest and most interesting news stories.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Leak Shows Business Side of China’s APT Menace

Krebs on Security

A new data leak that appears to have come from one of China’s top private cybersecurity firms provides a rare glimpse into the commercial side of China’s many state-sponsored hacking groups. ” The National Cybersecurity Strategy issued by the White House last year singles out China as the single biggest cyber threat to U.S.

article thumbnail

Top IT Asset Management Tools for Security

eSecurity Planet

However, the needs of cybersecurity now require that they also offer some kind of security resiliency to protect the assets they are discovering and cataloging. Additionally, they often provide an accurate account of technology asset lifecycle costs and risks as well as built-in cybersecurity features to combat ransomware and malware.

IT 109