-
Streamlined Security Solutions: PAM for Small to Medium-sized Businesses
Today, all organizations are exposed to the threat of cyber breaches, irrespective of their scale. Historically, larger companies were frequent targets due to their substantial resources, sensitive data, and regulatory responsibilities, whereas smaller entities often underestimated their attractiveness to hackers. However, this assumption is precarious, as cybercriminals frequently exploit
-
New Poco RAT Targets Spanish-Speaking Victims in Phishing Campaign
Spanish language victims are the target of an email phishing campaign that delivers a new remote access trojan (RAT) called Poco RAT since at least February 2024. The attacks primarily single out mining, manufacturing, hospitality, and utilities sectors, according to cybersecurity company Cofense. “The majority of the custom code in the malware appears to be…
-
Blumenauer to Biden: ‘We will all be better served’ by president’s withdrawal
Blumenauer became the latest Democrat to make the call Wednesday afternoon.
-
How InKind is deploying capital to restaurants like Magna Kusina, Kann
It isn’t a loan. It isn’t equity. InKind has created an alternative way to finance independent restaurants and restaurateurs in Portland like Gregory Gourdet and Carlo Lamagna are jumping on.
-
Exclusive: Inside a new Oregon battery manufacturing plant
Powin founder Joseph Lu set to open QPO Energy, a joint venture with Yulon Group.
-
Shifting rules on noncompetes leaves Oregon businesses flustered
Less than three months after the Federal Trade Commission banned noncompetes, a federal judge backed a legal challenge to them.
-
Portland CRE firm buys foreclosed downtown office building for $3.25M
The 100,000-square-foot J.K. Gill Building on Southwest Fifth Avenue went into foreclosure in 2023.
-
New Ransomware Group Exploiting Veeam Backup Software Vulnerability
A now-patched security flaw in Veeam Backup & Replication software is being exploited by a nascent ransomware operation known as EstateRansomware. Singapore-headquartered Group-IB, which discovered the threat actor in early April 2024, said the modus operandi involved the exploitation of CVE-2023-27532 (CVSS score: 7.5) to carry out the malicious activities. Initial access to the target
-
Is Your Business Losing Money Because Employees Can’t Use Tech?
-
Smash-and-Grab Extortion
The Problem The “2024 Attack Intelligence Report” from the staff at Rapid7 [1] is a well-researched, well-written report that is worthy of careful study. Some key takeaways are: 53% of the over 30 new vulnerabilities that were widely exploited in 2023 and at the start of 2024 were zero-days. More mass compromise events arose from…