In a joint cybersecurity advisory, several US government agencies warned that ransomware attacks on schools would likely increase in September. This might have been slightly more helpful if t
We’ve explored what you can do to try to reduce the risk of a ransomware attack in your VMware environment, but sometimes despite our best efforts environments are still compromised. Let’
How do today’s ransomware attackers find a way in? In truth, there are numerous routes, some more obvious than others. The key for ransomware attackers is to find an initial staging post. O
I previously explained how zero trust’s objectives and principles can prepare you for a ransomware attack. Let’s now talk about actual implementation via microsegmentation. What Microsegm
In early August 2022, the McAfee Mobile Research team identified a new virus, called HiddenAds, making its way through the Google Play store. According to the McAfee researchers, this virus h
On Sept. 6, two Utah-based newspapers reported that their company files had been encrypted and rendered inaccessible, delaying the publishing presses for 24 hours. Days earlier, something sim
I love to use analogies, so when I was asked to put together an article comparing honeypots vs. honeynets, I immediately thought of the word “fish.” Fish is an interesting word, in that i
Discerning trends in ransomware has never been easy, but every now and again something jumps out from the confusion of events that points clearly at trouble ahead. A good current example is t
In my last post, I explained what the zero trust model is, its three core objectives, and how it can prepare you for even the most unpredictable ransomware attacks. Today, let’s explore the