Don't miss @CyberThreatAlliance's panel on February 16, where panelists from @rapid7, @sophos, Scitum, and Cyber Threat Alliance will discuss mandatory #cyber incident reporting.
Register: https://us06web.zoom.us/webinar/register/WN_LCQV9cKuTzmuA5ODKRryHg
For more on helping the victims of cyber attacks and enhancing complex technical information gathering, check out our proposed Cyber Incident Reporting Framework created with the Cyber Threat Alliance and other key partners: https://securityandtechnology.org/virtual-library/reports/cyber-incident-reporting-framework/
Many countries are implementing mandatory cyber incident reporting requirements, including the US, EU, Australia, and India. While the typical private sector instinct might be to oppose such rules, properly drafted reporting requirements will ultimately benefit the business community. Governments and cybersecurity providers can use the resulting information to provide tailored assistance, generate better warnings to similarly situated companies, understand the total burden cybercrime is placing on the economy, and determine whether policies are having their intended effects. Join Imelda Flores (Scitum), Joe Levy (Sophos), Raj Samani (Rapid7), and Michael Daniel (Cyber Threat Alliance) as we explore how to make mandatory cyber incident reporting work as intended.
Patch or perish: Attackers are continuing to target out-of-date VMware systems to infect them with crypto-locking malware such as ESXiArgs and hold them to ransom. VMware warns that *multiple* long-patched flaws in ESXi may be getting exploited by #ransomware groups.
https://www.databreachtoday.com/ransomware-campaigns-compromise-more-vmware-esxi-hosts-a-21220
h/t @rapid7 @trellix @censysio #danielcard