Many admins wonder how susceptible Linux is to the scourge of ransomware. There’s a general belief—which is correct—that Linux is more secure by default than Windows. That leads to the incorrect belief among some that Linux systems are mostly invulnerable to ransomware. In fact, Linux ransomware is real, it’s very dangerous, and it’s growing. We’ve […]
An .rrcc file is a computer file that’s been encrypted by ransomware criminals. It’s a variant of the STOP/DJVU ransomware, and although a newer entrant into the ransomware game, it’s quickly rocketed to prominence. An .rrcc file appends standard computer files with “.rrcc,” so a Word file called “list.docx” would be renamed “list.docx.rrcc” by the […]
Endpoint detection and response (EDR) capability is widely touted as an essential part of defense against ransomware. Unfortunately, it doesn’t always work as well as planned. Instead of scanning devices for known malicious code, EDR software watches for unusual activity that looks like a hacker is trying to infiltrate a network. Or behavior that looks […]
When 2017’s WannaCry ransomware attacks made mainstream headline news, it might have seemed like ransomware was a problem mainly for organizations behind in their patching. However, the landscape has dramatically shifted, and ransomware is now an “everyone, all the time” problem. As a result, ransomware groups have cropped up that primarily target individuals. STOP ransomware […]
Even by its own grim standards, the last two years have been a remarkable time for the ransomware industry. Incidents have become ever more spectacular, while the ransoms being demanded have grown larger, sometimes to almost incredible levels. Innovations, meanwhile, have come thick and fast, including targeting critical infrastructure on a significant scale and encrypting […]
Earlier this year, the FBI released data which was interpreted by many in the tech press as saying phishing attacks were significantly more costly to organizations than ransomware. This conclusion has been challenged, and there’s now something of a counter-narrative available. (Note that this is an uncensored interview and contains language that’s likely to be […]
A REVEALING REPORT FOR IT PROFESSIONALS BY IT PROFESSIONALS