Blog

28 September, 2022

What Is an .rrcc File?

An .rrcc file is a computer file that’s been encrypted by ransomware criminals. It’s a variant of the STOP/DJVU ransomware, and although a newer entrant into the ransomware game, it’s q
Keith Ward
26 September, 2022

EDR Software ‘Easy to Bypass’ for Ransomware Operations

Endpoint detection and response (EDR) capability is widely touted as an essential part of defense against ransomware. Unfortunately, it doesn’t always work as well as planned. Instead of sc
Katherine Gorham
23 September, 2022

STOP/DJVU Ransomware: What You Need To Know

When 2017’s WannaCry ransomware attacks made mainstream headline news, it might have seemed like ransomware was a problem mainly for organizations behind in their patching. However, the
Becky Elliott
22 September, 2022

Why Ransomware’s Next Target Could Be Entire Countries

Even by its own grim standards, the last two years have been a remarkable time for the ransomware industry. Incidents have become ever more spectacular, while the ransoms being demanded have
John E. Dunn
20 September, 2022

Interview with an Access Broker: ‘I Took Everything from GitHub’

Earlier this year, the FBI released data which was interpreted by many in the tech press as saying phishing attacks were significantly more costly to organizations than ransomware. This concl
Katherine Gorham
19 September, 2022

Back to School Season Means Ransomware Attacks on Education

In a joint cybersecurity advisory, several US government agencies warned that ransomware attacks on schools would likely increase in September. This might have been slightly more helpful if t
Katherine Gorham
16 September, 2022

Protecting Your Virtual Machine Content from Ransomware

We’ve explored what you can do to try to reduce the risk of a ransomware attack in your VMware environment, but sometimes despite our best efforts environments are still compromised. Let’
Melissa Palmer
15 September, 2022

The Humble VoIP Phone System Is Now a Big Ransomware Target

How do today’s ransomware attackers find a way in? In truth, there are numerous routes, some more obvious than others. The key for ransomware attackers is to find an initial staging post. O
John E. Dunn
14 September, 2022

Microsegmentation: Trapping Ransomware Before It Can Spread

I previously explained how zero trust’s objectives and principles can prepare you for a ransomware attack. Let’s now talk about actual implementation via microsegmentation. What Microsegm
James Panetti
1 10 11 12 13 14 32

Is This Your Business?
Get In Touch

Contact Us To Sponsor Your Business Listing & Learn More About The Benfits.

Before You Go!
Sign up to stay up to date with everything ransomware

Sign Up To Receive Our Monthly Ransomware Newsletter
Don’t worry, we hate spam too

JUST RELEASED: The 2024 State of Ransomware Survey is in.

A REVEALING REPORT FOR IT PROFESSIONALS BY IT PROFESSIONALS

Share via
Copy link
Powered by Social Snap