For years, we’ve known how to eliminate passwords, but it was too hard for users. There may now be an accessible way for the average user. Or maybe not. On any list of priorities made by security practitioners, you’ll find something along the lines of, “Passwords are a disaster, and we need to get rid […]
Readers will doubtless have heard the phrase “Ransomware as a Service” (aka RaaS). The ransomware part of that term gets a lot of coverage but what about the service? Ransomware services, one might assume, must be served from somewhere, but where does this happen? The Dark Web It’s a question surprisingly few people ask. As […]
If there was ever a summer where ransomware has played out like a pastiche of the Hollywood movie industry, 2023 serves as an unwelcome example. This might sound flippant but there are instructive parallels. As in movies, there are summer releases and at least one or two big hits everyone gets to hear about. The […]
Sponsored Post: Tapan Mehta – Global Leader – Healthcare Strategy & Solutions – Palo Alto Networks Healthcare providers around the world are reimagining the patient experience with the use of smart medical devices. Protecting these devices need a comprehensive Zero Trust solution to mitigate ransomware attacks. You’ll find IoT devices all over the real world […]
A trend that often gets lost in the reporting of cybersecurity incidents is how important mainstream pen testing tools have become to cybercrime. This is also true in the ransomware sector where popular tools such as Cobalt Strike, Mimikatz, and PsExec are routinely abused for a multitude of tasks including reconnaissance, credential abuse, and post […]
Sponsored Post: Dominique Kilman – Director at Unit 42 by – Palo Alto Networks Not surprisingly, ransomware attacks continue to rise as more organizations fall victim to threat actor groups motivated by financial gain, notoriety, and espionage (on behalf of nation-states). However, the nature of ransomware attacks has evolved as multi-extortion attacks—involving encryption (victims pay […]
A REVEALING REPORT FOR IT PROFESSIONALS BY IT PROFESSIONALS