Crucial backup strategies to defend against ransomware attacks

Crucial backup strategies to defend against ransomware attacks

Ransomware payouts are trending back up. According to Chainalysis, a cryptocurrency tracing firm, 2021 was a record year for ransomware payments, totaling almost $1 billion. In 2022, there was a drop, but in 2023, ransomware payouts returned to that same torrid pace...
Work Diagnostics

Work Diagnostics

Introducing Work Diagnostics, an integral component of the Securaze Work software suite tailored for comprehensive testing of technical device functionalities. This diagnostic tool enhances report quality, bolsters the authenticity of Securaze products, and...
syslog-ng Store Box Splunk/HEC and Sentinel destinations

syslog-ng Store Box Splunk/HEC and Sentinel destinations

The syslog-ng Store Box (SSB) appliance is built on syslog-ng Premium Edition (PE). SSB inherits most of syslog-ng PE’s features and makes them available with an easy-to-use graphical user interface. One of the typical use cases for SSB (and syslog-ng PE) is...
MOST INSIDER DATA LEAKS ARE ACCIDENTAL

MOST INSIDER DATA LEAKS ARE ACCIDENTAL

Data breaches have become more common today. More importantly, the most newsworthy data breaches that occur are malicious, whether that is an individual or gang involved with ransomware or a disgruntled employee trying to settle a score. High-profile, large companies...
Crisis averted: A recap of the OpenSSH and XZ/liblzma incident

Crisis averted: A recap of the OpenSSH and XZ/liblzma incident

A novel backdoor (CVE-2024-3094)  was recently discovered from a widely used xz-utils ‘liblzma’ data compression library build system. This backdoor reportedly targets the OpenSSH server but has the potential to target any application that integrates with...