The LockBit ransomware operators have had a busy new year, with a notable attack on Britain’s Royal Mail that disrupted the postal service’s ability to send international letters and parcels: Royal Mail ransomware attackers threaten to publish stolen data. However, it seems that there are some targets LockBit feels should be off-limits.When LockBit’s ransomware was […]
Even if you aren’t worried quite yet about the increasing ease of writing malware, you should probably be deeply, deeply concerned about the major credential and personally identifiable information (PII) thefts that have happened over the past year or so. Here are just a few:Getting access to networks is especially easy right now. There have […]
It just keeps getting easier to create ransomware. Last year, schoolkids were doing it. Just last month, ransomware went open source. And now ChatGPT is enabling script kiddies to write functional malware. But just how big a threat is this, really?In the real world, the part where AIs can write code isn’t particularly scary. Yes, […]
Sponsored Post: Bart Lenaerts-Bergmans, Senior Product Marketing Manager, Intel, CrowdStrikeThe transaction details and monetization patterns of modern cybercrime reveal critical insights for organizations defending against ransomware attacks. Cybercrime has evolved over the past several years from simple “spray and pray” attacks to a sophisticated criminal ecosystem centered around highly effective monetization techniques that enable adversaries to […]
Sponsored Post: Bart Lenaerts-Bergmans, Senior Product Marketing Manager, Intel, CrowdStrike Financially motivated criminal activities, aka “eCrime,” happen in waves. They come and go as adversaries develop new tools and target vulnerable victims. Similar to how investors track stock market activity using various indexes, CrowdStrike monitors eCrime using multiple observables and codifies the activity in the […]
Sponsored Post: Narendran Vaideeswaran, CrowdStrike Director, Product Marketing, Zero Trust.Ransomware is a dangerous and evolving threat to organizations of every size, industry and geography. As ransomware operators and affiliates refine and evolve their strategies, security teams must ensure they have the strongest, most proactive protections in place to defend against this threat. This year’s Verizon Data […]