EKANS Ransomware Raises Industrial-Control Worries

Dark reading | February 03, 2020

EKANS Ransomware Raises Industrial-Control Worries
A fairly unsophisticated ransomware attack has raised a few eyebrows among security researchers for its ability to force computers to stop specific activities, or processes, related to industrial control systems, critical-infrastructure security firm Dragos stated in a report published on February 3.In the past, ransomware has generally caused disruption in industrial control system (ICS) environments as a side effect of the malware's destructive activity — encrypting data would cause some software to fail, causing outages. Although a relatively primitive attack, the EKANS ransomware actively targets certain products common in ICS environments, says Joe Slowik, an adversary hunter with Dragos.

Spotlight

Enterprises increasingly rely upon third-party software and services to handle business-critical processes and operations. Whether on-premises or in the cloud, these solutions must provide a level of security that protects critical company data and minimizes risk. Clarizen’s security standards and practices are backed by a multi-layered approach that incorporates best practices for preventing security breaches, as well as ensuring data integrity, availability and confidentiality.

Related News

DATA SECURITY

The Cybersecurity Skills Gap is Resolved by Battleship's New Mentoring Program

businesswire | March 01, 2021

Tutors are presently a tick away for current and hopeful network safety experts. Ship looks to upset network protection proficient improvement by explaining profession ways and separating boundaries to section and progression through virtual, organized, coaching programs. "We are confronting an intense abilities emergency in the worldwide online protection labor force, which has been exacerbated by COVID-19," says Awat Ilkani, Battleship's CEO. "Network safety is a rapidly advancing, youthful field, and exhaustive vocation advancement and arranging assets are inadequate. Existing experts are worn out and battling to design next vocation steps, prompting high wearing down rates, while hopeful experts face foundational issues like muddled section focuses and gatekeeping, leaving them unfit to enter the field," he proceeded. War vessel accepts that oversaw tutoring will give the profession improvement and arranging support that is at present missing and at last, help connect the network safety abilities hole. Established in Raleigh, NC in 2019, Battleship offers a product as-a-administration (SaaS), membership model to interface protégés with coaches. A large part of the interaction incorporates screening and onboarding possible tutors, who should have in any event 5-years of network safety experience, and consolidating prescient innovation with hand-coordinating to locate an incredible protégé/coach fit.

Read More

Hub Protection to provide INX Limited with military-grade Digital Asset Cybersecurity

prnewswire | September 15, 2020

Hub Security, the cyber security platform, is announcing the use of its military-grade VaultHSM to secure INX Limited's crypto services.This news comes on the heels of INX Limited's latest announcement of its initial public offering this week of up to 130 million INX Security Tokens (the "INX Tokens" or "Tokens"). Hub Security utilizes military-grade cybersecurity principles for its Vault HSM (Hardware Security Module) and handheld miniHSM devices' with FIPS Approved Cryptographic Algorithm Validation

Read More

SOFTWARE SECURITY

KLAS and Censinet Partner to Reduce Healthcare CISOs, CIOs and IT Vendor Community Cybersecurity Risk

businesswire | December 01, 2020

KLAS, a medical care exploration and bits of knowledge firm, and Censinet, the main astute danger network for medical care, today reported an association to help medical services IT sellers and administrations firms improve their general danger and security profile and give more noteworthy straightforwardness to a huge number of medical services suppliers. As a feature of the association, KLAS, which has led profound examination and investigation on in excess of 900 medical care IT items and administrations, will present another Cybersecurity Readiness Assessment. The organization will likewise incorporate community oriented exploration, knowledge sharing, unique report access, and cybersecurity best works on, equipping medical care leaders with crucial data to improve their cybersecurity act and at last, cultivate a safer and beneficial medical care biological system. While the enormous endeavor to execute electronic wellbeing records over the previous decade has prodded a period of advanced wellbeing development, it has likewise significantly extended the assault surface for digital crooks to target medical care associations. What's more, presently, the COVID-19 pandemic has both expanded dependence on computerized wellbeing and given aggressors considerably more motivating force to target suppliers, payers and others in the medical care industry.

Read More

Spotlight

Enterprises increasingly rely upon third-party software and services to handle business-critical processes and operations. Whether on-premises or in the cloud, these solutions must provide a level of security that protects critical company data and minimizes risk. Clarizen’s security standards and practices are backed by a multi-layered approach that incorporates best practices for preventing security breaches, as well as ensuring data integrity, availability and confidentiality.