I previously explained how zero trust’s objectives and principles can prepare you for a ransomware attack. Let’s now talk about actual implementation via microsegmentation.What Microsegmentation Is, and Isn’tMicrosegmentation is all about breaking your network into segments.Don’t confuse it with the old network segmentation; we’re not talking about firewalls with rules built around IP addresses. Consider […]
In early August 2022, the McAfee Mobile Research team identified a new virus, called HiddenAds, making its way through the Google Play store. According to the McAfee researchers, this virus has already affected more than one million users, a number expected to increase in the coming weeks.How Does HiddenAds Work?Attackers, taking advantage of the open […]
On Sept. 6, two Utah-based newspapers reported that their company files had been encrypted and rendered inaccessible, delaying the publishing presses for 24 hours.Days earlier, something similar happened at Savannah College of Art and Design (SCAD) in Georgia, this time leading to a breach of sensitive student and staff data.In California, it was the Los […]
I love to use analogies, so when I was asked to put together an article comparing honeypots vs. honeynets, I immediately thought of the word “fish.” Fish is an interesting word, in that it can denote a single fish: “I caught a fish this morning,” or multiple ones: “I caught almost a dozen fish yesterday.” […]
Discerning trends in ransomware has never been easy, but every now and again something jumps out from the confusion of events that points clearly at trouble ahead.A good current example is the steady rise of the Hive ransomware group, first reported around mid-2021. Since then, there has been a steady stream of attacks attributed to […]
In my last post, I explained what the zero trust model is, its three core objectives, and how it can prepare you for even the most unpredictable ransomware attacks. Today, let’s explore the three principles that fulfill those objectives.Inevitable BreachesAs I explained previously, the foundation of the zero trust model is the assumption that a […]