Software Contract Solutions

Avast identifies cryptocurrency scam rises in regions of high adoption

Research from Avast Threat Labs has revealed a growth in crypto-based scams in regions where cryptocurrency is growing in popularity, in the first half of 2021. Avast’s threat labs researchers have intercepted and protected users against a rise in phishing sites focused on cryptocurrency scams since the start of the year, with the majority posing … Read more

The threat of single vendor security is too high to ignore

Jaws dropped last year when the SolarWinds attack was revealed. The extent of the sophisticated intrusion was breathtaking: the hackers leveraged SolarWinds’ commercial software to infiltrate major firms and top government agencies, exposing sensitive data. Cyber criminals were able to jump from a single compromised laptop to the company’s Active Directory to the Azure Active Directory and … Read more

Ransomware recovery: Plan for it now

Make a disaster-recovery plan to address ransomware attacks, and start with stopping its spread, IDing the variant and getting ready to get restore your files. If your computing environment is subject to a large ransomware attack, you will most certainly be enacting your disaster recovery (DR) plan. But before you begin restoring systems, you must … Read more

Feds’ demand for software standards could boost enterprise security

An executive order issued in May by the Biden Administration has elevated the status of the software bill of materials, by mandating their use in federal government contracting. Enterprises can look for more transparency from software vendors after the Biden Administration’s recent mandate that software bills of materials be provided by companies attempting to do … Read more

Ransomware demands and payments hit new records

Ransomware groups continue to intensify their operations as ransom demands and payments increase alongside use of “quadruple extortion” tactics during first half of 2021. The average ransom paid by victim organisations has increased by 82% since 2020 to a record  $570,000, as cyber criminals intensify their ransomware efforts with increasingly aggressive tactics, according to data … Read more

Ransomware: Now attackers are exploiting Windows PrintNightmare vulnerabilities

Cyber-criminal groups including Vice Society and Magniber have been spotted using vulnerabilities in Windows Print Spooler to infect victims with ransomware. Cyber criminals are exploiting Windows PrintNightmare vulnerabilities in their attempts to infect victims with ransomware – and the number of ransomware groups attempting to take advantage of unpatched networks is likely to grow. The … Read more

Security blind spots persist as companies cross-breed security with devops

As devops matures into devsecops, cultural obstacles continue to exert drag. Devops has become common in software-development organizations around the world, but many companies are still struggling with cultural issues that are dampening security practitioners’ influence in the devsecops practices crucial for next-generation cloud application development. When it’s done well, devops is driving dramatic change—with GitLab’s recently released 2021 … Read more

Why email is still the most significant vector that attackers exploit

The impact of the pandemic is spoken about every day. Never before have we had to react to a danger such as COVID. However, we’re now seeing more repercussions develop because of our enforced actions. With the majority of the UK forced to work remotely from home instead of offices, there was a steep rise … Read more

How to protect backups from ransomware

Backups can be defended against ransomware attacks by moving them offsite from primary systems, removing file-system access to the backups, and avoiding using Windows as a backup platform. Ransomware is becoming the number one threat to data, which makes it essential to ensure that bad actors don’t encrypt your backup data along with your primary … Read more