Articles for April 2018

Atlanta spent $2.7M cleaning up after ransomware attack

If you thought the approximately $50,000 ransomware authors demanded from the city of Atlanta to unlock encrypted systems was a large sum, this next figure will make your head spin. On April 12, WSB-TV news in Atlanta aired a story about how the city signed eight emergency IT contracts within days of the ransomware attack.

The total bill from these service providers totaled $2.7 million dollars. The reason for the huge price tag? Atlanta was not able to bounce back quickly from the attack, which according to researchers, reveals much larger systemic problems.

Source: Atlanta spent $2.7M cleaning up after ransomware attack

Loading

Critical flaw leaves thousands of Cisco Switches vulnerable to remote hacking

Security researchers at Embedi have disclosed a critical vulnerability in Cisco IOS Software and Cisco IOS XE Software that could allow an unauthenticated, remote attacker to execute arbitrary code, take full control over the vulnerable network equipment and intercept traffic.

The stack-based buffer overflow vulnerability (CVE-2018-0171) resides due to improper validation of packet data in Smart Install Client, a plug-and-play configuration and image-management feature that helps administrators to deploy (client) network switches easily.

Source: Critical flaw leaves thousands of Cisco Switches vulnerable to remote hacking

 

Loading

Once a target, always a target: If you’re hit by hackers you’re likely to be hit again | ZDNet

The number of organisations that have fallen victim to cyber-attackers only to fall victim a second time is on the up.

If you’re unlucky enough to fall victim to hackers, you’re likely to fall victim to a similar cyber-attack or data breach in the months following the initial problem.

According to the newly-released FireEye M-Trends annual report for 2018, 56 percent of organisations that were targets of a significant attack in the last year and a half were targeted a second time in that period. That figure is up from 38 percent in 2013.

Source: Once a target, always a target: If you’re hit by hackers you’re likely to be hit again | ZDNet

Loading

What is hyperconvergence? Here’s how it works and why it matters | ZDNet

Keeping in mind that you don’t need to spend ANY money to do this… other than hardware.  This is a good article if you are a Nutanix fan.

Is hyperconverged infrastructure simplifying the way data centers are managed, or is it providing more clever means for certain enterprise technology vendors to regain their strongholds? Our executive guide covers everything you need to know.

Source: What is hyperconvergence? Here’s how it works and why it matters | ZDNet

Loading