The Guardian confirms criminals accessed staff data in ransomware attack

Discussion in 'malware problems & news' started by guest, Jan 11, 2023.

  1. guest

    guest Guest

    By Alexander Martin @AlexMartin - January 11, 2023
     
  2. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Would be nice to know what security tools they were using, it's a shame that this stuff is never disclosed. Back in the days I was quick to say that companies were most likely not secured correctly, but it has become clear to me that many security tools are way too easy to bypass. So you can't always blame it on the IT department.
     
  3. pegas

    pegas Registered Member

    Joined:
    May 22, 2008
    Posts:
    2,979
    One developed a security tool and the other figured out how to bypass it. It's simple and this cycle will keep improving security. Unfortunately even when security is paramount the human factor can greatly reduce its effectiveness. :isay:
     
  4. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Yes, but would be nice to know which security tools were bypassed, since they all claim that their AV/EDR systems are catching so many attacks. I remember reading about a fileless ransomware attack on some company years ago, and only SECDO was able to spot it. I can't find the article anymore and SECDO was acquired by Palo Alto Networks back in 2018.

    https://www.crunchbase.com/organization/secdo
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.