Cybersecurity News
New US Justice Department team aims to disrupt ransomware operations
The task force will focus on dealing with the “root causes” of ransomware.Rapid7 Acquires Velociraptor Open Source Project
The company plans to use Velociraptor's technology and insights to build out its own incident response capabilities.4 Innovative Ways Cyberattackers Hunt for Security Bugs

Justice Dept. Creates Task Force to Stop Ransomware Spread
One goal of the group is to take down the criminal ecosystem that enables ransomware, officials say.Zero-Day Flaws in SonicWall Email Security Tool Under Attack
Three zero-day vulnerabilities helped an attacker install a backdoor, access files and emails, and move laterally into a target network.QR Codes Offer Easy Cyberattack Avenues as Usage Spikes

Q&A on the Optional P2PE Solution Inventory Template
Point-to-Point Encryption (P2PE) technology makes data unreadable so it has no value to criminals even if stolen in a breach. Merchants can take advantage of this technology with a P2PE solution, a combination of secure devices, applications, and processes that encrypt payment card data from the point it is used at a payment terminal until it reaches a secure point of decryption. PCI P2PE Solutions are those that have been validated as meeting the rigorous security requirements of the PCI P2PE Standard and are listed on the PCI Security Standards Council (PCI SSC) website. PCI P2PE Solutions provide the strongest protection for payment card data and can simplify merchant efforts to comply with the PCI Data Security Standard (PCI DSS).
Business Email Compromise Costs Businesses More Than Ransomware
Ransomware gets the headlines, but business paid out $1.8 billion last year to resolve BEC issues, according to an FBI report.Google rushes out fix for zero‑day vulnerability in Chrome
The update patches a total of seven security flaws in the desktop versions of the popular web browser
The post Google rushes out fix for zero‑day vulnerability in Chrome appeared first on WeLiveSecurity
Pulse Secure Critical Zero-Day Security Bug Under Active Exploit

How to Attack Yourself Better in 2021
Social engineering pen testing is just one step in preventing employees from falling victim to cybercriminals.Nearly Half of All Malware is Concealed in TLS-Encrypted Communications
Forty-six percent of all malware uses the cryptographic protocol to evade detection, communicate with attacker-controlled servers, and to exfiltrate data, new study shows.Attackers Heavily Targeting VPN Vulnerabilities
Threat actors like attacking the technology because they provide a convenient entry point to enterprise networks.Instagram debuts new tool to stop abusive message salvos made through new accounts
DMs are the next area the firm wants to focus on in controlling abusive behavior.Swiss Army Knife for Information Security: What Is Comprehensive Protection?

Novel Email-Based Campaign Targets Bloomberg Clients with RATs
