PowerWare ransomware uncovered, uses PowerShell for insertion

This is an explanation of yet another flavor of ransomware, this time leveraging Powershell in the exploit.  This has therefore generated another defensive layer to consider in your fight against infection.


W-2 Data Breach places 21K Sprouts Farmers Market employees at risk

This is yet another example of a well-crafted phishing attack that has resulting in the compromise of significant PII.  These issues are not combated by technical controls alone.  Organizations must dedicate resources to effective user awareness training and design policies and procedures that allow for proper checks and balances.  IT can not solve all problems.