vulnerabilities

Learnings from the Kaseya Supply Chain Attack and Mass Ransomware Incident

On Friday, July 2, at least eight MSPs were hit with ransomware that infected their infrastructure and many of their customers. The attack exploited some unpatched vulnerabilities in the on-premises Kaseya VSA product, and then leveraged the remote monitoring and management (RMM) solution to help spread the ransomware. The incident allegedly has affected up to 1,500 companies, and […]

Learnings from the Kaseya Supply Chain Attack and Mass Ransomware Incident Read More »

The Future of Cybersecurity in Asia Pacific and Japan – 2nd edition

In 2019 Sophos and TRA collaborated to launch the first edition report of the Future of Cybersecurity in Asia Pacific and Japan. That report revealed that organisations in APJ faced a series of cybersecurity obstacles in the areas of education, company culture, skills, budgeting, and operational management. At the time, the key themes centred on

The Future of Cybersecurity in Asia Pacific and Japan – 2nd edition Read More »

Claroty Biannual ICS Risk & Vulnerability Report: 2H 2020

EXECUTIVE SUMMARY Few of us will fondly remember 2020, a transformative year that forced businesses worldwide to rethink and reprioritize remote workforces, their impact on productivity and business continuity, and the expanded attack surfaces consequential to those changes. Opportunistic attackers went especially low throughout 2020, elevating extortion and ransomware attacks within their arsenals and targeting

Claroty Biannual ICS Risk & Vulnerability Report: 2H 2020 Read More »

AMNESIA:33

How TCP/IP Stacks Breed Critical Vulnerabilities in IoT, OT and IT Devices Executive summary Forescout Research Labs has launched Project Memoria, an initiative that aims at providing the community with the largest study on the security of TCP/IP stacks. Project Memoria’s goal is to develop the understanding of common bugs behind the vulnerabilities in TCP/IP

AMNESIA:33 Read More »

Active Directory Security – A modern approach to avoid exploitation

Active Directory Security – A modern approach to avoid exploitation 10:00am AWST | 1:00pm AEDT See live demo attacks! How is Active Director (AD) being used today and why is it important: The AD Threat Landscape The AD and ransomware relationship Common vulnerabilities in AD being exploited Best practices on how to avoid a compromise

Active Directory Security – A modern approach to avoid exploitation Read More »