Category: Ransomware Articles

When discussing the ever-changing ransomware threat landscape, we often talk about what devices threat actors will target next. In addition to mobile devices, the other technology I get asked about the most is “Internet of Things” (IoT), and whether we should expect threat actors to begin going after the “smart” products in our homes or […]

Because Microsoft Exchange is so often targeted by ransomware gangs and other malicious organizations, it’s critical to do everything possible to secure your Exchange environment. And for organizations that still host some or all their Exchange servers on-premises, it’s doubly important. Recommendations regarding the security of your Exchange systems aren’t much different than the advice […]

One of the biggest internal debates facing ransomware recovery planners is whether to pay an extortion demand or fall back on a process of internal data recovery. Increasingly, however, victims who decide to pay face a second and potentially complex question: is it worth trying to retrieve a ransom after it has been paid? For […]

A critical and often underestimated resource in the fight against malware is the industry’s history of finding and reporting software flaws in everything from big-brand programs to websites and software APIs. Many software companies and a few larger enterprises run dedicated programs that offer massive rewards for researchers opting for this type of work, sometimes […]

There is a definite cool factor concerning the use of honeypots to hunt down an elusive hacker. Deploying a honeypot or two across your network is like creating a spy network within your organization that works undercover to help take down the bad guys. But while a honeypot does have a place within an effective […]

Ransomware targeting VMware hosts is rapidly on the rise, and Black Basta is one of the latest jumping on the bandwagon. Like most ransomware, this relative newcomer first targeted Windows systems, but the Uptycs Threat Research team recently discovered a fresh Linux variant a few months later, developed by the same authors, which specifically targets […]