Blog

06 December, 2022

Best Practices for Recovering from Ransomware

Do you have a disaster recovery plan for ransomware? I mean, do you really have a plan? Could you tell me what it is in a paragraph if you had to? Could you lay out what happens in a step-by-
Keith Ward
05 December, 2022

Protect Yourself with Ransomware Tabletop Exercises

One of the best ways to protect yourself against ransomware is through role playing. If you’re thinking Dungeons and Dragons right now, you’re actually on the right path—a ransomware ta
Keith Ward
02 December, 2022

Linux Ransomware: How Vulnerable Are You?

Many admins wonder how susceptible Linux is to the scourge of ransomware. There’s a general belief—which is correct—that Linux is more secure by default than Windows. That leads to the
Keith Ward
12 October, 2022

What Security Teams Need To Know About the Ransomware Threat Landscape

Sponsored Post: Nick Lowe, CrowdStrike Director, Falcon OverWatch. Organizations of every vertical, size, and location can be targeted with a ransomware attack. Here’s what y
Nick Lowe
28 September, 2022

What Is an .rrcc File?

An .rrcc file is a computer file that’s been encrypted by ransomware criminals. It’s a variant of the STOP/DJVU ransomware, and although a newer entrant into the ransomware game, it’s q
Keith Ward
26 September, 2022

EDR Software ‘Easy to Bypass’ for Ransomware Operations

Endpoint detection and response (EDR) capability is widely touted as an essential part of defense against ransomware. Unfortunately, it doesn’t always work as well as planned. Instead of sc
Katherine Gorham
23 September, 2022

STOP/DJVU Ransomware: What You Need To Know

When 2017’s WannaCry ransomware attacks made mainstream headline news, it might have seemed like ransomware was a problem mainly for organizations behind in their patching. However, the
Becky Elliott
22 September, 2022

Why Ransomware’s Next Target Could Be Entire Countries

Even by its own grim standards, the last two years have been a remarkable time for the ransomware industry. Incidents have become ever more spectacular, while the ransoms being demanded have
John E. Dunn
20 September, 2022

Interview with an Access Broker: ‘I Took Everything from GitHub’

Earlier this year, the FBI released data which was interpreted by many in the tech press as saying phishing attacks were significantly more costly to organizations than ransomware. This concl
Katherine Gorham
1 11 12 13 14 15 33
Share via
Copy link
Powered by Social Snap