Original network protocols are starting to age out of usefulness. HTTP is being replaced by HTTPS, people are trying to replace DNS with DNSSEC, and TLS just got its first update in 8 years. Now it's time to update SMB. It's time for Safe-T Secure File Access.
For a certain kind of secure communication, Server Message Block (SMB) is no longer suited for the task. Windows machines use SMB to pass files around a network. Printers, mail servers, and high-priority internal network segments use SMB to provide access to remote users. Although SMB is convenient for Windows and other networks, it’s also convenient for attackers.
No company is too small to be devastated by a ransomware attack. In fact, small and medium-sized businesses (SMBs) are prime targets, and the number--and cost--of such attacks continues to rise.
Open source databases may have a problem. For the second time in just three years, a popular open-source database has become infected, on a massive scale, with cryptocurrency-related malware. In late 2016, the vector of the infection was MongoDB, and the source of the infection was ransomware.
A new report from IBM shows that the total number of breached records dropped about 25% last year, an amount representing 2.5 billion files. Unfortunately this did not mean that information security professionals suddenly discovered how to stop cyberattacks altogether. Most of the drop comes from files that have been encrypted, rather than outright stolen.
It’s not just the physical world that’s volatile; the cyber world isn’t safe either. Just barely a month after Wannacry ransomware shook up the cyber ecosystem, there was another cybersecurity epidemic that wreaked global havoc on June 27th.
This time it’s Petya, or is it NotPetya... or maybe GoldenEye...
It’s another day and another global cyber attack, which is debilitating companies all over Europe and the US this time by ransomware known as, Petya. Organizations have come to the conclusion that protecting information is key to keeping customers and maintaining business stability. However, the way in which information and assets are protected must change because the current model just isn’t keeping hackers from the vital business assets.