In early August 2022, the McAfee Mobile Research team identified a new virus, called HiddenAds, making its way through the Google Play store. According to the McAfee researchers, this virus h
On Sept. 6, two Utah-based newspapers reported that their company files had been encrypted and rendered inaccessible, delaying the publishing presses for 24 hours. Days earlier, something sim
I love to use analogies, so when I was asked to put together an article comparing honeypots vs. honeynets, I immediately thought of the word “fish.” Fish is an interesting word, in that i
Discerning trends in ransomware has never been easy, but every now and again something jumps out from the confusion of events that points clearly at trouble ahead. A good current example is t
In my last post, I explained what the zero trust model is, its three core objectives, and how it can prepare you for even the most unpredictable ransomware attacks. Today, let’s explore the
The threat of multiplatform ransomware has been growing over the last several years. The attackers’ motivation is pretty simple: they want to cause the most damage in your environment as qu
In the era of cloud computing and the continuing trend of work-from-home employees, the ability to connect remotely to servers is central to being able to get almost anything done on a comput
Honeyfiles and honeypots are becoming an increasingly important strategy against ransomware. This is because ransomware attacks continue to surge, and new ways of extorting payments ar
While we still refer to them as ransomware attacks, such incidents are no longer just about encrypting the files of a targeted victim. Ransomware attacks today are about gaining leverage on s