Security

Acronis Cyber Protect is hereThe catchy title for this post celebrates a special moment. Not many companies have a chance to disrupt and transform an old, stable industry, but that’s exactly what Acronis did today.

That’s because we’ve released Acronis Cyber Protect – our game-changing cyber protection solution that integrates backup, disaster recovery, next-gen anti-malware, cybersecurity, and endpoint management tools into one integrated service.

As a result, we’re eliminating complexity, improving productivity, and enabling our managed service provider (MSP) partners to easily and efficiently scale while making security a focus of their service portfolio.

Business Data's Value Means Cyber Protection is Needed

IDC's Andrew Smith, Research Manager, Enterprise Infrastructure, offers his thoughts on how enterprises are collecting more data than ever before and learning how to use that data to digitally transform their business...and how its increased value has implications for storage, usage, and security. A new data strategy should be considered.

"Solving this problem requires the right data strategy," he says, "something inclusive which spans organizational disciplines and ensures the flood of data being welcomed with open arms doesn't end up washing us away."

Backup before updating software

The ancient Greeks once warned about “the cure being worse than the disease.” Unfortunately, that’s exactly what’s happened when Microsoft released its patches for the Meltdown-Spectre vulnerabilities.

Microsoft’s fix is bricking some computers, proving once again that creating a backup before installing any system update is critical.

Acronis Machine Learning

Acronis Active Protection is an advanced technology that uses sophisticated analysis to monitor and stop erratic processes on your system. If ransomware somehow manages to get through your anti-virus and starts to encrypt files, Acronis Active Protection will detect the encryption and immediately halt it – automatically restoring the files to the most recently backed up version. While performing well in independent testing and earning accolades from the media, Acronis has worked diligently to make it even better. The result is an improved version that incorporates machine learning and artificial intelligence technologies.

Locky Empire Strikes Back

Locky ransomware

Locky is one of the most widespread and active ransomware families on the malicious threats landscape. There is a new version that just appeared a couple of days ago. It’s being delivered by the Necurs botnet through SPAM emails containing Microsoft Word macros exploiting the Microsoft’s Dynamic Data Exchange (DDE). DDE is a Windows feature that handles the electronic transfer of MS Office files using shared memory and data.

Cerber Ransomware

The well known Cerber ransomware continues to be active this summer. The size of the cryptolocker varies between 244 to 292 Kbytes, with the new builds spreading via spear phishing email campaigns, targeting enterprises. The latest Cerber ransomware easily bypasses traditional defenses. The analyzed Cerber sample (MD5: cfd2d6f189b04d42618007fc9c540352) was only detected as a suspicious malicious object by nine out of 64 antiviruses on the first submission to Virustotal. The low detection rate can be explained by the fact that the cryptolocker is using a polymorphic encryptor and API call obfuscation to protect its copies from being detected by antiviruses.

 

Petya Ransomware

The new Petya-like ransomware just served a big blow to hundreds of banks, corporations, government organizations, post offices and shopping outlets around the world, spreading like fire, taking advantage of the EternalBlue exploit used by WannaCry ransomware only a few weeks before.

Petya, Petrwrap, EternalPetya — while the world is still deciding what to call this damaging ransomware worm, let’s pull it apart and see what it’s made of.

Weekly Tech Roundup — April 24

Technology News

New malware botnets, Ransomware as a Service campaigns, and financial breaches littered the technological landscape last week. But that doesn’t mean the world of tech isn’t going to fight back. Find out what’s being done to combat these emerging threats, and what you can do to protect your data in the meantime in our weekly tech roundup.

Weekly Tech Roundup — April 17

Coffee Blockchain

The good guys had some wins this week, making the digital world a little bit safer. But it seems the world needs balance—new threats popping up in the place of old ones. Luckily, the innovations weren’t all bad (have you heard about a company that is trying to transform the global coffee supply chain with blockchain?) What tech headlines did you miss last week?

Weekly Tech Roundup — April 10

This week was full of milestones, breakthroughs, and innovations. New malware was uncovered, old records were broken, and new threats emerged. Now more than ever, it’s important that to keep an eye on the technical horizon, because you never know what new ways your data could become vulnerable. What headlines did you miss?