Remove Encryption Remove SMB Remove VPN
article thumbnail

Network Break 274: Let’s Encrypt Revokes Millions Of Certificates; Microsoft Pitches SMB Over QUIC

Packet Pushers

Let's Encrypt revokes millions of digital certs, Microsoft proposes SMB over QUIC for file access without a VPN (and an easier way to get through firewalls), big vendors offer extended free trials of conferencing software for companies considering remote work, Microsoft pays hourly workers full salaries during work slowdowns, and more.

SMB 52
article thumbnail

Cato Research Decrypts the News Behind February Security Events

CATO Networks

The POC was able to generate the so called Blue Screen of Death on Windows clients that connects into a compromised SMB server. Vulnerabilities in SMB servers should be treated very seriously. If attackers compromise an SMB server in the organization, they can exploit SMB vulnerabilities as part of wider lateral movement.

SMB 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Latest Cyber Attacks Demonstrate the Need to Rethink Cybersecurity

CATO Networks

The same group that was behind a series of attacks on companies using sophisticated malware that encrypts files, known as Sodinokibi or REvil. It is speculated that the attack on Travelex became possible because the company had failed to patch vulnerable VPN servers. We also address the shortcomings of VPNs.

VPN 52
article thumbnail

Cato CTRL Threat Research: Sophisticated Data Exfiltration Tools Used in Double Extortion Ransomware Attacks by Hunters International and Play 

CATO Networks

Executive Summary Modern ransomware attacks have evolved beyond simple encryption to deploy sophisticated double extortion tactics. Threat actors now systematically exfiltrate sensitive data before encrypting systems, ensuring leverage even when victims have robust data backups. GreenCollector tool (identified as fs256.exe)

SMB 40