I’m Lindsay, a malware analyst and reverse engineer, with a special enthusiasm for obfuscation and anti-reverse engineering techniques used in malware! I am also a woman in the field of cybersecurity. I am often asked “How did you get into cybersecurity?” or “What advice would you give young women interested in cybersecurity?” There are many […]
For the longest time ransomware attackers stuck to extorting ransoms by encrypting the files of victims in return for an “unlock” key. As backup and disaster recovery made that less effective, around 2019 criminals turned to ‘double’ extortion—the tactic of threatening to publicly release data stolen during attacks. Now it seems ransomware gangs have rapidly […]
Despite the seismic transition to cloud computing, 90% of Global Fortune 1,000 companies still rely on on-premises Active Directory (AD) for authentication and access management. While startup companies today have the option to go cloud-native, the AD domain controller is still a staple component throughout SMB enterprises. The ubiquitous presence of AD is one of […]
Sponsored Post – Ransomware Recovery How a focus on recovery changes the outcome of ransomware attacks Data is one of the most valuable resources in business these days, and it is at the heart of IT systems that keep both public and private-sector operations running. When a ransomware attack removes access to data, the effect […]
Active Directory (AD) is at the heart of Windows networks. That means AD is also a prime target for ransomware actors, who would love nothing more than gaining control over it. The good news is there are numerous measures available at your disposal to create a defense-in-depth strategy to protect your network’s valuable AD infrastructure. […]
It’s a tall order to keep your entire enterprise free of ransomware. The perpetual headlines concerning such attacks over the past couple years are a constant reminder of that. While you should implement a cybersecurity strategy that aims for the stars, a strong emphasis should be place on the containment of an attack (some might […]