article thumbnail

SMBs continue to be a target of cybercriminals

Network World

Because they don’t see themselves as targets, small-to-midsize businesses (SMB) have for a long time believed that their security programs are good enough. They have a firewall, antivirus, maybe they even use two-factor authentication. The mistake is believing that this is enough because they have nothing of value to an attacker.

SMB 258
article thumbnail

Ghost Ransomware a Persistent Global Threat to Critical Infrastructure

SecureWorld News

He urges enterprises to implement Privileged Access Management (PAM) solutions and multi-factor authentication (MFA) and to enforce robust password policies to reduce the risk of account compromise. Disable unused ports like RDP 3389, FTP 21, SMB 445. Network segmentation and monitoring Segment networks to prevent lateral movement.

SMB 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyberattacks on SMBs Reach Record Highs Despite Confidence in Defenses

SecureWorld News

Yet, despite the rising threats, 85% of SMB leaders surveyed said they felt prepared to protect against or recover from cyberattacks. This confidence comes even as only 20-34% reported following best practices such as multi-factor authentication, strong passwords, and role-based access controls for sensitive data.

SMB 119
article thumbnail

Recipe for Cybersecurity Success in the Restaurant Industry

SecureWorld News

Restricting the use of high-risk ports like RDP or SMB for inbound and outbound communication can further reduce the potential for data exfiltration." Regular audits, the use of password managers, enforcement of password complexity policies, and multi-factor authentication (MFA) can significantly reduce the attack surface."

Industry 116
article thumbnail

Joint Cybersecurity Advisory: Watch Out for BlackMatter RaaS

SecureWorld News

Using embedded, previously compromised credentials, BlackMatter leverages the Lightweight Directory Access Protocol (LDAP) and Server Message Block (SMB) protocol to access the Active Directory (AD) to discover all hosts on the network. Go a step further by regularly updating your passwords and enabling multi-factor authentication (MFA).

Backup 98
article thumbnail

New Cryptocurrency Mining Botnet, Prometei, Thrives on Stealth

SecureWorld News

The actor employs various methods to spread across the network, like SMB with stolen credentials, psexec, WMI and SMB exploits. The discovered passwords are sent to the C2 and then reused by other modules that attempt to verify the validity of the passwords on other systems using SMB and RDP protocols.". How does Prometei work?

SMB 54
article thumbnail

Top 10 Commonly Exploited Initial Attack Vectors

SecureWorld News

Multifactor authentication (MFA) is not enforced. RDP, Server Message Block (SMB), Telnet, and NetBIOS are high-risk services. The advisory notes that malicious threat actors often exploit poor security configurations, weak controls, and other faulty cyber hygiene practices in order to gain initial access to a victim's system.

SMB 97