https://variety.com/2020/digital/news/hackers-21-million-ransom-grubman-shire-meiselas-sacks-entertainment-law-firm-1234606193/ A cybercriminal ring claiming to have stolen a huge cache of data from a major media and entertainment law firm — whose clients include Bruce Springsteen, Madonna, Elton John and Lady Gaga — is demanding a $21 million ransom payment, according to a published report. New York-based Grubman Shire Meiselas... read more →
May
14
May
13
https://www.youtube.com/watch?v=ogoK45FdhU8
May
13
https://www.cyber.gov.au/news/government-service-agents-urged-protect-clients-and-themselves Agents of government services, such as taxation agents and financial advisers, are attractive targets for cybercriminals. The ACSC has published Cyber Security for Agents of Government Services to help agents protect their clients' valuable and personal information, and their own businesses.
May
13
https://www.itnews.com.au/news/asd-says-cyber-resilience-still-far-too-low-across-govt-546818 Agencies still struggling to fully-implement top four. Most federal government agencies are still struggling to fully-implement mandatory cyber security controls, with more than 70 percent reporting below baseline levels of maturity last year. The finding, contained in the Australian Signals Directorate's first cyber security posture report to parliament, continues a worrying... read more →
May
13
https://www.cyber.gov.au/publications/essential-eight-to-ISM-mapping The Strategies to Mitigate Cyber Security Incidents is a prioritised list of mitigation strategies to assist organisations in protecting their systems against a range of adversaries. While no single mitigation strategy is guaranteed to prevent cyber security incidents, organisations are recommended to implement eight essential mitigation strategies as a baseline. This... read more →
May
12
The Australian government has disseminated information to improve cybersecurity and better protect our nation’s digital assets since 2010. The “Essential-8” began with the Defence Signals Directorate’s (DSD now ASD) “Top 35” mitigation strategies. Over the ensuing decade little has changed with poor patching still posing the most insidious risk to... read more →
May
07
https://www.itnews.com.au/news/toll-group-rebuilding-core-systems-used-for-its-online-operations-547829 After Nefilim ransomware infection. Toll Group is having to rebuild the core systems that underpin most of its online operations following an infection with a type of ransomware called Nefilim. The logistics giant said on Wednesday afternoon it is manually cleaning affected servers and systems “and restoring files from backups”.... read more →
May
06
Q: Scott, you have been in the cyber security and data protection industry as an independent advisor for more than 20 years and set up Securite (formerly McEvoy Thomas) in 1998 in Australia, can you describe the hot issues and areas you are working with your clients on presently? A:... read more →
May
05
Crowdstrike has recently partnered with Airlock and together they make a very strong team. Following is a short video that shows how they can work together: https://www.youtube.com/watch?v=ogoK45FdhU8 I have also attached the Airlock datasheet so you can read more. If you have any questions or would like a demonstration of... read more →
May
05
https://risky.biz/snakeoilers11pt2/