GajShield Next Generation Firewall Appliances Provides complete visibility into various threats and performance inhibitors allowing organization to make informed and proactive security measure. Threat Management incorporates an ICSA certified firewall, Context based Data Leak Prevention System, Application Filtering, BYOD Policy management, VPN, URL Filtering, Gateway Antivirus, Intrusion Prevention System and Performance Management has Traffic Analysis, Network behavior analysis, Policy based ...
Read More »Author Archives: firewallsadmin
Attackers compromised Microsoft support agent’s credentials to access users’ email accounts
Attackers compromised Microsoft support agent’s credentials and gained access to view ‘limited’ number of users’ email account information. Upon learning about the incident, Microsoft immediately disabled the compromised support agent’s credentials. What is the issue – Microsoft notified its users via email that a certain ‘limited’ number of users who use web email services managed by Microsoft might have had their ...
Read More »Newly discovered RobinHood ransomware variant drops four ransom notes at once after encryption
RobinHood renames the encrypted files something similar to Encrypted_b0a6c73e3e434b63.enc_robinhood. The ransomware drops 4 ransom note with different names at the same time. A new ransomware named RobinHood has been found targeting computers within an entire network. The operators of the ransomware are so particular about victims’ privacy that they delete the encryption keys and IP addresses after the payment is ...
Read More »IE under fire, Triton goes under the microscope, and Norsk Hydro reeling from ransomware attack
Plus, Minnesota and North Carolina cities hit by hackers As April hits its stride, we saw a week of Wi-Fi bugs, Assange’s public eviction and King’s College warnings. These things also happened. Need another reason to quit using Internet Explorer? How about this XXE zero-day? Microsoft has all but killed off Internet Explorer, but more than a few PC owners continue to hold out. ...
Read More »Hackers crack university defenses in just two hours
More than 50 universities in the United Kingdom had their cyber-defenses tested by ethical hackers, and the ‘grades’ aren’t pretty A team of ethical hackers recently conducted tests on the cybersecurity defenses of more than 50 universities in the United Kingdom. In each case, it took them less than two hours to gain access to “high-value data”. This is according to ...
Read More »Romanian Duo Convicted of Malware Scheme Infecting 400,000 Computers
The duo are convicted of infecting 400,000 computers in the U.S. with malware and scamming victims out of millions of dollars. A Romanian duo has been convicted for infecting hundreds of thousands of computers with malware that scooped up credentials and financial information, and scamming victims out of millions of dollars. The two, Bogdan Nicolescu, 36, and Radu Miclaus, 37, ...
Read More »More Than Half of Organizations with Cybersecurity Incident Response Plans Fail to Test Them
A vast majority of organizations are still unprepared to properly respond to cybersecurity incidents, with 77 percent of survey respondents indicating they do not have a cybersecurity incident response plan applied consistently across the enterprise. The 2019 Cyber Resilient Organization study from IBM Resilient also found that of the organizations that do have a plan in place, more than half (54 percent) ...
Read More »Uniden commercial site compromised to distribute Emotet trojan
The official website of Uniden has been compromised to host an MS Word document that delivers a variant of the Emotet trojan known as Geodo and Heodo. The malicious Word document is capable of delivering three JavaScript payloads and all three payloads have signatures for Geodo. What is the issue – abuse.ch’s URLhaus project uncovered that the official website of Uniden ...
Read More »Threat actors leverage old email conversation threads to spread Emotet
Threat actors revive old email conversation threads to inject a link to an Emotet-infected file. The tactic has been previously used by a North Korean hacker group to target various individuals. The operators of Emotet trojan have evolved their tactics to spread the malware. Lately, they have been observed reviving old email conversation threads to inject a link to an ...
Read More »PLDT taps Cisco for 5G transport network infrastructure
Officials of PLDT Inc and Cisco announce their 5G partnership in Manila on April 11, 2019. Jessica Fenol, ABS-CBN News MANILA – PLDT Inc said Thursday it tapped global firm Cisco to develop 5G-ready transport network infrastructure, broadening its partnerships in rolling out the next generation connectivity standard. Cisco will build the 5G transport network using PLDT’s existing fiber facilities, company ...
Read More »