On Nov. 7, the ALPHV ransomware group targeted the network of financial services company MeridianLink and, according to the group, stole files. No encryption was involved but, the group claims, MeridianLink was aware that the attack had happened. A communication took place between the attackers and the company, but no ransom was paid. So far, […]
Sponsored Post: Nasuni. As we enter week four of National Cybersecurity Awareness Month (NCSAM), it’s worth making the connection between ransomware and your overall business continuity strategy. Ransomware has been a scourge for years, but the attacks are only growing more sophisticated, capable of hitting multiple sites and bringing your entire organization to a halt. What’s […]
On May 17, the city of Augusta, Georgia, published a public information tweet of a type that’s becoming increasingly familiar to citizens across the United States: “The City is currently experiencing a disruption in network services, which may affect telephone and email access. We are working diligently to resolve the issue as soon as possible. […]
An odd characteristic of cybercrime is that it’s almost always disembodied. Crimes are perpetrated by someone out there but precisely who is only rarely made clear. This mystery can confuse victims. The history of crime is a long one but until recently it was a much more human-to-human affair, conducted in person. This didn’t make […]
Sponsored Post: Nick Lowe, CrowdStrike Director, Falcon OverWatch. Organizations of every vertical, size, and location can be targeted with a ransomware attack. Here’s what you need to know about how these threats are evolving. Ransomware activity continues to grow and evolve each year, putting all organizations at heightened risk of an attack. Security teams, the protectors of the […]
Honeyfiles and honeypots are becoming an increasingly important strategy against ransomware. This is because ransomware attacks continue to surge, and new ways of extorting payments are constantly being developed. Because of this, honeypots and their close cousin, honeyfiles, help root out the bad guys before they compromise your network. A bit of history helps […]