802.1X Security | Part 2

Most companies do not have an extra security layer when a client computer connects to the wired network. When connecting to a network, the client computer receives an IP from a DHCP (Domain Host Configuration Protocol: the “IP generator”). At this point, a client computer is not identified or authenticated on a wired network and attacks based on the hacker’s knowledge can be launched.  

(more…)

0 Comments

802.1X Security | Part 1

As part of the global trending increase in cloud data consumption, Gartner predicts that by 2023 80% of enterprises will also adopt two or more cloud-based security services. In this category, enterprises have shifted from using on-premises Active Directories to cloud-delivered Active Directories.

(more…)

0 Comments

Password Hashing: How Databases Protect Your Passwords

May 5th is Liberation Day in my country (the Netherlands). Although the Allies did not fully liberate The Netherlands in August 1945. Soon after the war, the Dutch government decided that Liberation Day would take place on May 5th, the date of the German army’s defeat.  This year, May 5th was on Thursday and the first Thursday of May is also known as World Password Day.

(more…)

0 Comments

The Conti Files | Part 4

As already mentioned in last week’s post despite the recent leak of internal communications and code from the Conti ransomware group, at the start of the Russia – Ukrainian war in late February 2022, Conti continued operations without breaking stride, in part thanks to constant technological innovation. 

(more…)

0 Comments

The Conti Files | Part 3

As already predicted in a previous post about Conti, it did not take long for them to reappear in the spotlight of the news. Last week the ransomware gang claimed to be responsible for the cyberattack that hit a German manufacturer of wind turbines, Nordex. This attack happened on March 31, 2022. Nordex shut down its IT systems across multiple locations and business units as a preventive measure, trying to prevent the threat to spread across their networks. This week, Nordex announced that it was working on fully recovering operations after the attack. 

(more…)

0 Comments

The Conti Files | Part 2

As discussed in my previous post, the Conti Files Part I, a big leak at the start of the war in Ukraine struck a serious blow to the Conti organization. Although there are still speculations about the reason behind the leak, most experts think the leak is related to Conti’s threat to attack Western targets in response to any cyber attacks on the Russian government or on the country’s critical infrastructure. This threat was not appreciated by some of their “ransomware-as-a-service” (RaaS) clients that ranged all over Eastern Europe, especially not the ones in Ukraine, and the files seem to be leaked by a Ukrainian security researcher.

(more…)

0 Comments

The Conti Files | Part I

One of the most notorious ransomware groups is Conti. It is a criminal organization behind advanced ransomware technologies, such as Ryuk and Hermes. This type of ransomware is extremely damaging (and popular with cybercriminals) due to the speed with which it encrypts data and is spread to other systems.

(more…)

0 Comments