The US Federal Bureau of Investigation (FBI), the Dutch National Police (Politie), and the Swedish Police Authority (Polisen), in cooperation with the US Drug Enforcement Administration (DEA) and 16 other countries have carried out with the support of Europol one of the largest and most sophisticated law enforcement operations to date in the fight against encrypted criminal activities.
The Kimsuky APT—also known as Thallium, Black Banshee, and Velvet Chollima— continues to target the South Korean government, according to the Malwarebytes Threat Intelligence team, who is actively monitoring this actor and has been able to spot phishing websites, malicious documents, and scripts that have been used to target high profile people within the government of South Korea. The structure and TTPs used in these recent activities align with what has been reported in KISA’s report.
Rave Mobile Safety (Rave) announced the results of its fourth annual 2021 Workplace Safety and Preparedness Survey. The findings show that employers are reevaluating how to best protect employees both on-site and remotely in a year of unprecedented change.
No health system should have to decide between improving patient care or covering the high cost of an unexpected ransomware attack. Examine the health and wellness of your IT infrastructure—just like a patient—to prevent long-term issues down the line.
Thanks to advancements in cloud video surveillance, retailers who want a high-performance video surveillance system do have alternatives to ripping and replacing and expensive upgrades. For both heightened security and business optimization, here’s what retailers should look for in a video management system and provider.
New steps would enhance enforcement of the National Firearms Act and aid states in drafting “extreme risk protection order” laws
June 8, 2021
The Department of Justice announced two new steps to help address gun violence in the U.S. The department issued a notice of proposed rulemaking and published model legislation to help states craft their own “extreme risk protection order” laws, sometimes called “red flag” laws.
Consider the breadth and depth of experience that an integrator brings to the table: years in business, across a range of market segments and applications, involving dozens if not hundreds of installed and serviced products. Before making the decision to take the entire security procurement, installation, service and monitoring process in house, consider the full value of using professional services for your security needs.