Monday, July 23, 2018

Samsam infected thousands of LabCorp systems via brute force RDP

Review: Zero tolerance malware and code blocking with Solebit

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jul 23, 2018
Featured Image

Samsam infected thousands of LabCorp systems via brute force RDP

LabCorp, one of the largest clinical labs in the U.S., said the Samsam ransomware attack that forced their systems offline was contained quickly and didn't result in a data breach. However, in the brief time between detection and mitigation, the ransomware was able to encrypt thousands of systems and several hundred production servers. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Review: Zero tolerance malware and code blocking with Solebit
$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert
6 myths CEOs believe about security
What is security's role in digital transformation?
Review: Bricata adds threat hunting to traditional IPS/IDS
The future of computer security is machine vs machine

White Paper: PTC

4 Reasons Remote Monitoring is Your Best Move to Better Service

Download this free e-book to discover how companies are realizing proven returns with IoT-enabled remote monitoring, which can be quickly implemented and monetized. Read More

Thumbnail Image
INSIDER

Review: Zero tolerance malware and code blocking with Solebit

By shifting malware detection away from signatures and behavior to whether any kind of code exists where it's not supposed to be, the SoleGATE Security Platform from Solebit has the potential to disrupt both endpoint security and sandboxing. Read More

Thumbnail Image
DealPost

$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert

Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren't in use. Read More

Thumbnail Image
INSIDER

6 myths CEOs believe about security

Want a more effective IT security strategy? Dispel your CEO and senior management of these common cybersecurity misconceptions. Read More

Thumbnail Image
INSIDER

What is security's role in digital transformation?

Digital transformation is front of mind for many senior executives, but too often security is left behind. Read More

Thumbnail Image
INSIDER

Review: Bricata adds threat hunting to traditional IPS/IDS

Bricata offers advanced IPS/IDS protection, but also goes a step farther, adding the ability to launch threat hunts based on events, or simply anomalies. Read More

Thumbnail Image
INSIDER

The future of computer security is machine vs machine

Better security automation at the OS level and via cloud services will force hackers to respond in kind. Read More

White Paper: PTC

Remote Monitoring Provides Real-Time Information for Improved Servicing

In the "Quick Start Guide: Monitoring Equipment with IoT" eBook, Tech-Clarity, an independent manufacturing technology research firm, shows how manufacturers can use remote monitoring to quickly identify failures and efficiently repair equipment. Tech-Clarity provides actionable steps that manufacturers can take to connect remote equipment, gather the right data and put that data to use. Read More

Editor's Picks

1. 11 tips for prioritizing security spending
2. Are bad analogies killing your security training program?
3. Security platform or best of breed? There's only one answer
4. How to perform a risk assessment: Rethinking the process
5. The 5 best malware metrics you can generate
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 3:00 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive