Don't wanna be here? Send us removal request.
Text
A new ransomware attack called Bad Rabbit looks related to NotPetya
New Post has been published on http://blog.esecforte.com/ransomware/bad-rabbit-ransomware-strikes-ukraine-and-russia/
A new ransomware attack called Bad Rabbit looks related to NotPetya
The U.S. government has issued a warning about a new ransomware attack that spread through Russia and Ukraine and into other countries around the world.
‘Bad Rabbit’ Ransomware strikes Ukraine and Russia
A new strain of ransomware nicknamed “Bad Rabbit” has been found spreading in Russia, Ukraine and elsewhere.
The malware has affected systems at three Russian websites, an airport in Ukraine and an underground railway in the capital city, Kiev.
The cyber-police chief in Ukraine confirmed to the Reuters news agency that Bad Rabbit was the ransomware in question.
It bears similarities to the WannaCry and Petya outbreaks earlier this year.
However, it is not yet known how far this new malware will be able to spread.
“In some of the companies, the work has been completely paralysed – servers and workstations are encrypted,” head of Russian cyber-security firm Group-IB, Ilya Sachkov, told the TASS news agency.
Two of the affected sites are Interfax and Fontanka.ru.
Meanwhile, US officials said they had “received multiple reports of Bad Rabbit ransomware infections in many countries around the world”.
The US computer emergency readiness team said it “discourages individuals and organisations from paying the ransom, as this does not guarantee that access will be restored”.
Cybersecurity experts said the ransomware — which posed as an Adobe update before locking down computers and demanding money for people to get their files back — targeted Russian media companies and Ukrainian transportation systems. It has also been detected in other countries including the U.S., Germany, Japan, Turkey and Bulgaria.
The U.S. Computer Emergency Readiness Team said late Tuesday it “has received multiple reports of ransomware infections … in many countries around the world.”
Dubbed “Bad Rabbit,” the virus is the latest example of cybercriminals using ransomware to try to extort money from victims across the globe. Two major international attacks earlier this year — NotPetya and Wannacry — caused widespread disruption affecting businesses, government institutions and hospitals. Source : http://www.bbc.com/news/technology-41740768, http://money.cnn.com/2017/10/24/technology/bad-rabbit-ransomware-attack/index.html
Bad Rabbit joins NotPetya and WannaCry, 2017’s two other major ransomware-style malware outbreaks.
#Bad Rabbit#Bad Rabbit ransomware#Petya#Ransomware strikes Russia#Ransomware strikes Ukraine#WannaCry#Cyber Security#Network Security#Ransomware
0 notes
Photo

Best Penetration Testing Services
eSec Forte has been providing Best Penetration Testing Services for 17+ years. Our Penetration Testing Services help businesses identify potential risks to their web applications, websites and software’s; thereby conduct penetration testing to monitor and protect the computer system from malicious activities or attack of hackers.
Whether responding to a data security incident, forming compliant policies or guiding the development of a comprehensive security strategy, eSec Forte has the certified and talented workforce to deliver robust solutions to companies of all sizes.
eSec Forte Top Penetration Testing Company has been providing Best Penetration Testing Services for 17+ years.
Penetration Testing Services
We help businesses identify potential risks to their web applications, websites and software’s; thereby conduct penetration testing to monitor and protect the computer system from malicious activities or attack of hackers.
WORK FLOW OF PENETRATION TESTING SERVICES:
Information gathering- Information such as user credentials, attack scope, and system architecture is gathered in penetration testing. This is the most time consuming phase and cannot be ignored. Our penetration testing services perform thorough research for this information gathering.
Scanning- Scanning is done to find actual loopholes in the system. The scanning is done manually or using automation tools to detect vulnerabilities.
Exploitation- Our penetration testing services exploit the system vulnerabilities and gains access to the target. We locally enumerate system to find mis-configurations and other loopholes.
0 notes
Photo

Network Penetration Testing Services Company
eSec Forte Technologies - Top Network Penetration Testing Company of India Offers you Best Network Penetration Testing Services they are located at Mumbai, Delhi, Noida Gurgaon, Banglore, Pune in India, We also serve Kuwait, UAE, Bangladesh & Sri Lanka.
1 note
·
View note
Text
Why it is essential to build resilience around privileged accounts?
New Post has been published on http://blog.esecforte.com/privileged-access-management/why-it-is-essential-to-build-resilience-around-privileged-accounts/
Why it is essential to build resilience around privileged accounts?
Source : https://www.arconnet.com/risk-to-watch/why-it-is-essential-to-build-resilience-around-privileged-accounts
Arcos – Privileged Access Management
Would you ever leave your home unlocked? Unless you have a lost the key or it’s an unintended blunder, keeping our home safe and secure is always of utmost importance for everyone. And that’s why people also spend money on some highly advanced surveillance and access systems available in the market that provides security against intruders and unimagined eventualities.
Likewise, any enterprise is at grave risk if highly critical admin accounts also known as privileged accounts are left unmonitored. If organizations fail to keep these accounts under check, malefactors can inflict a heavy cost given that privileged accounts have elevated permission to access highly-critical information stored in a host of servers, applications and network security devices.
There are basically two types of threats that loom around privileged accounts.
1 Insider threats: this is the most common threat for any enterprise be it a retail chain, bank, insurance company or media house. Data breach due to a compromised insider can erode organization’s hard-earned reputation and inflict heavy financial loses. Mostly, enterprises become target of unfaithful insiders as IT security staff don’t anticipate or fail to address this threat. There is lack of user behavior analytics i.e. no control over who is accessing the privileged accounts, at what time and for what purpose. Organizations that suffer data breach invariably have no any powerful real-time threat analytics tool such as Privileged Access Management.
2 External threats: today’s enterprises face stiff challenges in protecting sensitive data. Increasing amount of vital information is being shared with third-party consultants and vendors. Monitoring and identifying a possible breach becomes an ominous task for firms in the current IT environment where classified data could be administered by multiple vendors, essential to perform routine business operations. Any bad actor in this chain, just like an insider, could severely harm business by misusing privileged access authorization.
Phishing, targeted attacks, Malware/ ransomware attack are some of the other most common forms of threats that can cause systems breakdown as malicious codes tap elevated login credentials and break into the severs if unsuspecting user clicks or downloads unverified, unauthenticated links and emails.
eSec Forte Technologies is an CMMi Level 3 | ISO 9001:2008 | ISO 27001-2013 certified Vulnerability Management & Audit Company and IT Services Company with service offerings in Information Security like VAPT Services, Penetration Testing Services, Vulnerability Assessment Services , Amongst our clients we proudly count Government Organizations, Fortune 1000 Companies and several emerging companies. We are also Value Added Partners of ARCOS Privileged Access Management (PAM) Tool.
We are headquartered in Gurugram, Mumbai, Delhi, Bangalore – India. Contact our sales team @ +91 124-4264666 you can also Drop us email at [email protected] for implementation of ARCOS Privileged Account Management Solution (PAM) at your Enterprise & Data Center.
0 notes
Photo

Vulnerability Assessment Services & Scanning
Vulnerability Testing services help maintain compliance, eliminate IT security threats, and can reveal how hackers may breach systems. Vulnerability management (Services) is a drain on your security team. Scans take too long, vulnerabilities detected are difficult to prioritize and new threat signatures are often not updated. This won't be an issue when you gain continuous visibility with our expertise.
#Vulnerability Testing services#Vulnerability Testing Company#Vulnerability Audit Services#Vulnerability Audit Company#Vulnerability Assessment Services#Vulnerability Assessment Company#Vulnerability management Services#Vulnerability management Company
0 notes
Text
Test Post from eSec Forte - Information Security Blog
Test Post from eSec Forte - Information Security Blog http://blog.esecforte.com
0 notes