EGroupware 21.1 released
New Kanban module & improved features for people in home office
smallPART: Single/Multiple Choice Tests and open Questions smallPART (selfdirected media assisted learning lectures & Process Analysis Reflection Tool) is an application for video-based learning. EGroupware GmbH develops
the tool in cooperation with the Technical University of Kaiserslautern. smallPART allows time-synchronous work directly “in the video”: students and pupils can ask questions about the film or give feedback in “real time” –
in secure mode or as a jointly held, public discussion.
The software for video-based learning has been part of EGroupware since version 20.1. With version 21.1, smallPART integrates single/multiple choice tests as well as open questions, and can also evaluate them
The playbook is based on Sophos telemetry as well as 81 incident investigations and insight from the Sophos Managed Threat Response (MTR) team of threat hunters and analysts and the Sophos Rapid Response team of incident responders. The aim is to help security teams understand what adversaries do during attacks and how to spot and defend against malicious activity on their network.
Key findings in the playbook include:
Advertisement
•The median attacker dwell time before detection was 11 days – To put this in context, 11 days potentially provide attackers with 264 hours for malicious activity, such as lateral movement, reconnaissance, credential dumping, data exfiltration, and more. Considering that some of these activities can take just minutes or a few hours to implement – often taking place at night or outside standard working hours – 11 days offer attackers plenty of time to cause damage in an organization’s network. It is also worth noting that ransomware attacks t
The group is using ransomware intended to make its espionage and destruction efforts appear financially motivated.
A new attack group called Agrius is launching damaging wiper attacks against Israeli targets, which researchers said are hiding behind ransomware to make their state-sponsored activities appear financially motivated.
Sentinel Labs analysts said they have been tracking Agrius’ operations in Israel since 2020 and have observed the evolution of the group’s malware, Apostle, to include ransomware functionality. Researchers added that the wiper attacks were conducted using a secondary malware called “Deadwood” (a.k.a. “Detbosit”), which Sentinel Labs said has “unconfirmed links to an Iranian threat group.”
Cyber gang behind Irish health system attack also hit more than a dozen US healthcare organisations
Conti group has attacked more than 400 entities worldwide including law enforcement agencies, municipalities, emergency medical services and 911 dispatch centres
Cyber gang behind Irish health system attack also hit more than a dozen US healthcare organisations
The Federal Bureau of Investigation (FBI) said on Thursday that the Conti ransomware operatives who recently took down Irish health system have also hit the networks of at least 16 US healthcare and first response organisations in the past 12 months.
The agency shared the information via a flash alert [pdf] to help security professionals and network admins secure their organisation s network against future Conti attacks.