GUEST OPINION by Joe Slowik, Gigamon Principal Security Engineer, Applied Threat Research: Data exfiltration exists as a cornerstone of malicious cyber operations, yet its nature and impact have changed significantly in recent years. Historically, adversaries linked to state sponsors or similar activities would engage in data theft to further goals of industrial espionage or intellectual property theft.
GUEST OPINION by Joe Slowik, Gigamon: Network security operations generally and network security monitoring (NSM) evolve more specifically with technology like any other information technology (IT) field.
GUEST OPINION by Joe Slowik, Gigamon: Data exfiltration exists as a cornerstone of malicious cyber operations, yet its nature and impact have changed significantly over the past few years.
Since grabbing headlines in early May, the high profile ransomware incident impacting the US oil pipeline system Colonial Pipeline has attracted significant attention from both media and information security spaces, given the event’s scope and impact.
Nine Entertainment is maintaining a no-official-comment policy on the breach of its Sydney network that came to light on 28 March, but the company appears to have no objection to its staff making the wildest of claims about the incident.
The network attack on Nine Entertainment, made public on Sunday, appears to have been carried out by unknown miscreants using a strain of Windows ransomware known as MedusaLocker which was discovered back in 2019.
A Republican senator from Ohio has criticised the US Government over taking more than three months to say who was accountable for not stopping the SolarWinds supply chain attack that first came to light in December 2020.
ANALYSIS The assertion by Microsoft President Brad Smith during a 60 Minutes interview with CBS on Sunday that the supply chain attack revealed by security firm FireEye in December was "the largest and most sophisticated attack the world has ever seen" has once again raised the question of the extent to which Microsoft was involved in this attack.