Search
Close this search box.

Category: Ransomware Articles

Just when you think ransomware criminals have exhausted their box of surprises, up pops something brand new nobody saw coming. The latest example, first reported by Bleeping Computer, is a disarmingly simple innovation—target organizations inside Russia for extortion attacks. According to the website, since late March a new group called NB65 claims it has attacked […]

Moscow’s Federation Tower is not particularly famous outside Russia, yet thousands of ransomware victims across the world might have an unwelcome connection to some of the companies operating from within its shimmering glass walls. Designed by a German-based architect, the tower is in fact two skyscrapers of different heights, named simply Vostok (East) and Zapad […]

Public entities in North Carolina are prohibited from paying a ransom demand following an attack, an idea that may be spreading to other U.S. states. According to an article in the National Law Review, the law goes even further than that, barring any communications with a ransomware actor following an attack. The ban applies broadly […]

This month, our focus is on living-off-the-land techniques, and why they help ransomware threat actors execute attacks more stealthily. The concept of living-off-the-land (LotL) was first introduced by researchers to the broader security community in 2013, and has remained popular with threat actors ever since. Common LotL Techniques The binaries used in living-off-the-land are sometimes […]

Often in the ransomware world, the oldest, most common methods of hacking an organization remain the most effective. That includes social engineering, which, although some feel is less effective now that there’s much more widespread knowledge about it, remains a key way to infiltrate a target. Social engineering involves convincing people into giving up valuable […]

There is no doubt that the reset option for computing devices has changed has proved a game changer. It’s the chance to start over once again with a clean slate. For enterprises that manage their Windows devices using Microsoft Endpoint Manager (MEM), you can simply reset the device and let MEM reinstall the applications automatically […]

Is This Your Business?
Get In Touch

Contact Us To Sponsor Your Business Listing & Learn More About The Benfits.

Before You Go!
Sign up to stay up to date with everything ransomware

Sign Up To Receive Our Monthly Ransomware Newsletter
Don’t worry, we hate spam too

JUST RELEASED: The 2024 State of Ransomware Survey is in.

A REVEALING REPORT FOR IT PROFESSIONALS BY IT PROFESSIONALS