Been hacked? Call us now


This is where we share our expertise, thoughts and advice.

A new ransomware promises to be El Dorado for cybercriminals

The new Eldorado ransomware targets Windows and VMware ESXi systems, with sixteen victims primarily in the United States across various industries. Groupe-IB researchers observed Eldorado’s activities and announced the threat on RAMP forums. This ransomware uses the ChaCha20 algorithm for encryption and generates unique keys for each locked file.
How can you protect against ransomware? Learn more in the article.

The regression vulnerability in OpenSSH: a threat to enterprise security

A serious vulnerability has been found in OpenSSH on glibc-based Linux systems, which represents an important security risk that might impact your organization and millions of organizations, with now, exposed OpenSSH servers.
Contact us for a thorough assessment and tailored security solutions.

F-22 Raptor jet with another jet in the background during a flight operation.

Navigating CMMC Compliance: Challenges for Small Businesses

Achieving CMMC compliance can be challenging for small businesses, but it’s crucial for securing DoD contracts. Common issues include high costs, limited resources, and complex regulations. Malleum offers comprehensive support with services like our Cybersecurity Readiness Assessment, vCISO service, and managed security solutions. These services help small businesses efficiently navigate compliance, ensuring robust cybersecurity and ongoing protection. Discover how Malleum can streamline your path to CMMC compliance with tailored, cost-effective solutions designed for small businesses.

How to Know You’re Getting a Quality Penetration Test

In the fast-evolving landscape of cybersecurity, ensuring that your organization’s defenses are robust requires more than just off-the-shelf solutions. Penetration testing, or pen testing, is a critical component of a comprehensive security strategy. However, the quality of these tests can vary significantly. Distinguishing a high-quality engagement from a superficial one can be challenging. Here’s what to look for to ensure you’re getting a penetration test that truly enhances your security posture.