Analyzing Encrypted RDP Connections

Analyzing Encrypted RDP Connections

By Anthony Kasza, Corelight Security Researcher Microsoft’s Remote Desktop Protocol (RDP) is used to remotely administer systems within Windows environments. RDP is everywhere Windows is and is useful for conducting remote work ...

Securing Internet Videoconferencing Apps: Zoom and Others

The NSA just published a survey of video conferencing apps. So did Mozilla. Zoom is on the good list, with some caveats. The company has done a lot of work addressing previous ...
Shade Ransomware Groups Shuts Down Operation and Releases Decryption Keys

Shade Ransomware Groups Shuts Down Operation and Releases Decryption Keys

The group behind the Shade ransomware has closed up shop and distributed around 750,000 decryption keys, along with decryption software, apologizing to everyone that was affected by their malware. There are numerous ...
SOCs, false positives, SOC

Blockchain-based VPNs: The Next Step in Privacy Tech?

Could open source bandwidth utilized by blockchain be the alternative to today’s VPN? Every person who goes online today fights a losing privacy battle. Every site we visit, every app we download, ...
Security Boulevard
CISO, CISOs, solarwinds, security, CISO corporate security

Security in Today’s Global Remote Workforce Era

Here are four ways security teams can support a sudden and large remote workforce Security measures put in place across global organizations historically have not been one of the top three priority ...
Security Boulevard

How to Add More Security to Your VPN Connection

Your home or business network is much more secure when you use a VPN. VPN is an acronym and it stands for virtual private network. It is practically an encrypted connection over ...
Musings on Modern Data Security

Musings on Modern Data Security

As I am expanding my responsibilities to cover some exciting data security topics (like, say, our cloud data discovery DLP), I wanted to briefly discuss a few broader issues I have noticed ...

Real-life Examples of Blockchain-Based Digital Transformation

Introduced in 2008 as the technology enabler for Bitcoin, blockchain can now address many challenges across a wide range of industries. Its architecture and built-in trust mechanisms make blockchain implementation a perfect ...
L4NC34 Ransomware’s Encryption Routine Reversed by Researchers

L4NC34 Ransomware’s Encryption Routine Reversed by Researchers

Security researchers reversed the encryption routine employed by L4NC34 ransomware by decrypting a file without paying the ransom. Sucuri Security first encountered L4NC34 ransomware when it began investigating an attack in which ...
encryption

Keeping Up With Encryption in 2020

Encryption has become key to many cyber defense strategies, with organizations looking to more securely protect their data and privacy, as well as meet stricter compliance regulations including Europe’s GDPR and the ...
Security Boulevard