Software Contract Solutions

Kraken Cryptor ransomware merges with Fallout exploit kit, fees slashed to gain followers

The ransomware-as-a-service is attempting to drum up more business in the Internet’s underbelly. A new ransomware variant which is making waves in the Dark Web, Kraken Cryptor, has now been added to the Fallout exploit kit. Collaborative research conducted by Insikt Group and McAfee, with the assistance of Recorded Future, has revealed the inclusion of … Read more

Cyber insurance market for SMBs growing fast, says study

Report provides first-hand insights into industry trends, cyber insurance shopper profiles and key market predictions. CyberPolicy, the world’s first online cyber insurance marketplace, this week released new findings on the state of cyber insurance within the small and medium-sized business (SMB) market. Interestingly, although being typically reserved for large enterprises with ample capital, the cyber … Read more

Business email compromise made easy for cyber criminals

Poor security practices and access to hacking services are making it easy for cyber criminals to compromise business email, research reveals. Around 12.5 million company email boxes and 33,000 finance department credentials are openly accessible on the web, research from digital risk management and threat intelligence firm Digital Shadows has found. This is making it … Read more

Cisco unearths 13 ‘High Impact’ IOS vulnerabilities you need to patch now

Cisco details security problems in its IOS and IOS XE switch and router operating software and warns on Linux flaw impact. Cisco today exposed 13 vulnerabilities in its IOS and IOS XE switch and router operating software that the company said should be patched as soon as possible. The vulnerabilities were detailed in Cisco’s twice-yearly … Read more

Security and compliance concerns eroding confidence in the cloud

New research from Advanced reveals 88% of firms say cloud providers need to do more to build confidence. There are still many businesses out there still not utilising the cloud – according to Advanced, it’s 24% – suggesting there is a job for technology providers to do in reassuring businesses on the benefits of the … Read more

Cyber security best practice: Definition, diversity, training, responsibility and technology

We look at cyber security best practice – everything from defining it to the importance of training. Cyber security is a business problem, not a technology one. This misconception is the greatest challenge facing businesses across entire industries, according to Ina Wanca – founder of AI Governance, and former director of Cybercrime Prevention at the Citizens Crime … Read more

Online crime costs more than $1m a minute

More than $1m is lost to cyber crime every minute, a report reveals, underlining the increasing and significant threats businesses face online. Every 60 seconds, close to $1.14m is lost to cyber crime, and 1,861 people fall victim, according to a report by threat management firm RiskIQ. Bad actors continue to proliferate online, the report … Read more

Patch expert calls on Microsoft execs to fix Windows updating

IT admins surveyed by Susan Bradley, who moderates the PatchMangement.org mailing list, said Microsoft’s current strategy is failing. So she took their concerns to Microsoft leaders, including CEO Satya Nadella, and asked them to make changes. Microsoft’s patching, updating and upgrading of Windows – in particular Windows 10 – is a mess that the company … Read more

Supply chain attacks are the next big risk for organisations

According to CrowdStrike’s new report, two-thirds of respondents have suffered a supply chain attack within the last year. While enterprise leaders scramble to fend off ever-evolving cyber threats, a new report from CrowdStrike shows why business leaders need to be more precious about their supply chain. According to the report, 90% of respondents admitted to incurring … Read more

Enterprise cyber threat remediation ineffective, study shows

Enterprise cyber threat remediation needs to improve in several key areas, according to an analysis of common remediation strategies. Common enterprise cyber threat remediation strategies are about as effective as random chance, a study has revealed. Some of the simple rule-based strategies do not perform any better than rolling the dice, according to a follow-up report by predictive cyber risk … Read more