Tuesday, March 27, 2018

SamSam group deletes Atlanta's contact portal after the address goes public

SamSam ransomware attacks have earned nearly $850,000

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Mar 27, 2018
Featured Image

SamSam group deletes Atlanta's contact portal after the address goes public

An image shared with local media during the early stages of a SamSam ransomware infection in Atlanta exposed the contact portal assigned to the city by the group responsible for the attack. When questioned about their actions via the exposed portal, the SamSam group later deleted the contact form, calling the questions and comments spam. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

SamSam ransomware attacks have earned nearly $850,000
Get a 299-Piece All-Purpose First Aid Kit For $12 Today
Microsoft to ban 'offensive language' from Skype, Xbox, Office and other services
Review: Intellicta brings issue tracking to compliance rules
The global cyber war is heating up: Why businesses should be worried
Third-party security vetting: Do it before you sign a contract

White Paper: Amazon Web Services Marketplace

Accelerating Innovation for the Public Sector with the AWS Marketplace

AWS Marketplace helps governments and other public sector organizations deliver better services faster with cloud-based software through a curated digital catalog. Customers can find, buy, deploy, and immediately start using software and solutions offered by popular software vendors in the online store. Read More

Thumbnail Image

SamSam ransomware attacks have earned nearly $850,000

First emerging in late 2015, the group believed to be responsible for the SamSam ransomware family has targeted small and large businesses, healthcare, governments, and education. To date, the group has made nearly $850,000 USD Read More

Thumbnail Image
DealPost

Get a 299-Piece All-Purpose First Aid Kit For $12 Today

The highly rated kit includes a first aid guide, vinyl gloves, bandages, cold compress, gauze pads, trauma pad, cotton-tipped applicators, first aid tape roll, antiseptics and all three common OTC pain medications. Neatly organized in a soft zippered pouch. Read More

Thumbnail Image

Microsoft to ban 'offensive language' from Skype, Xbox, Office and other services

Microsoft will ban "offensive language" and "inappropriate content" from Skype, Xbox, Office and other services on May 1, claiming it has the right to go through your private data to "investigate." Read More

Thumbnail Image
INSIDER

Review: Intellicta brings issue tracking to compliance rules

The Intellicta Platform from TechDemocracy acts like a security information and event management (SIEM) console, but for compliancy issues. It pulls information from a series of network collectors and correlates that data into a continuously-monitored compliancy dashboard. Read More

Thumbnail Image
INSIDER

The global cyber war is heating up: Why businesses should be worried

From NotPetya's global disruption to North Korea's digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here's how to defend against them. Read More

Thumbnail Image
INSIDER

Third-party security vetting: Do it before you sign a contract

Security needs to ensure that all vendors and partners, even those not controlled by IT, meet the organization's security standards. Read More

Video/Webcast: Riverbed Technology

Extending the Software-Defined Network to the Wireless Edge

Key to the success of today's digital strategies is a highly interactive and responsive user experience - whether from a small office, retail shop, public venue, or multi-national enterprise. In this webcast, you will learn how to build a network across both wide and local areas to enable a great user experience through high bandwidth, scalability, and security. Read More

CSO Insider

1. 14 top tools to assess, implement, and maintain GDPR compliance
2. What are the GDPR requirements?
3. Third-party security vetting: Do it before you sign a contract
4. Separation of duties and IT security
5. Review: Bricata adds threat hunting to traditional IPS/IDS

Editor's Picks

1. Rogues' gallery: 7 insiders who breached security
2. Why you don't need an RFID-blocking wallet
3. The 6 best password managers
4. 8 hot cyber security trends (and 4 going cold)
5. The 10 Windows group policy settings you need to get right
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:03 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive