IDENTITY & ACCESS MANAGEMENT THAT PREPARES YOUR BUSINESS FOR TAKEOFF With 63% of confirmed data breaches* involving weak, default or stolen passwords, identity has become the most consequential attack vector organisations are facing today. As organisations embrace cloud, mobile and web applications, the attack surface increases as does the probability that a single compromised identity […]
What’s Next for Ransomware: Data Corruption, Exfiltration and Disruption
As I’m sure you have all seen, the latest news reports of a new Petya-like global attack is spreading fast. The attack uses the NSA’s External Blue exploit involved in last months WannaCry outbreak. The details of how the malware is behaving is still developing but what’s been found so far is the ransomware primarily […]
What we know so far: Petrwrap/PetyaWrap seems to be very similar to a less prevalent variant of ransomware that was seen last year, called GoldenEye. Specifically, they both vary slightly to other more common ransomware, in that they target the master boot record of the OS rather than individual files. This renders the machine fairly […]
I wanted to share with you all of the Cylance communications on the “Petya-Like” Ransomware attack so that you have further information to share with customers who are remediating from this today. Dominating the news currently are reports of a new, widespread, “Petya-like” global ransomware attack. Cylance® Threat Guidance is currently in possession of the […]
Petya Ransomware Spreading Fast Using Same Wannacry Exploit
A new approach to Identity & Access Management The threat landscape is changing at a rapid pace and traditional IAM approaches are leaving IT Security and operations teams ill equipped to ensure that employees can access the files and applications they need without compromising security. In fact, 63% of confirmed data breaches1 involve weak, […]
Threats become incidents. Incidents become breaches. Cyber security becomes business critical. Every day news hits the papers about potential cyber threats that face UK businesses. Last year, government research reported that two-thirds of big UK businesses had been hit by a cyber-attack in the previous year1. In a new report released by Internet Service […]
The Blue Cube ethos is to offer fully independent and accurate advice providing the expertise, technology and management skills to help identify where to protect, what to protect and how to protect corporate IT resources and enable secure access for authorised users.
Blue Cube Security Ltd.
0345 094 3070
©2017 BLUE CUBE SECURITY LTD. ALL RIGHTS RESERVED.