In some countries, kidnappings are so common that an entire industry of negotiators and consultants emerged to facilitate the exchange of ransoms and the safe recovery of victims. Many aspect
One form of ransomware quickly making a name for itself is cryptojacking. With this type of attack, bad actors work to take over any system with processing power for the purpose of harnessing
The stereotypical profile of a hacker in his parents’ basement developing and launching attacks can officially be put to rest. The geopolitical nature of executing attacks against states or
Buying cyberinsurance in case of a ransomware attack is a common action for organizations. But will the very fact you’ve taken that step make you more vulnerable to attack? That may have be
How many organizations across the world were successfully breached by ransomware in the last 12 months? Normally, blogs such as this rely on guesstimates to answer such questions, but now the
In the past decade we have seen cybersecurity companies releasing new products under the category of “deception technology.” For industry veterans, these solutions sound a lot like honeyp
Something unexpected is happening to ransomware statistics: for the first time since anyone can remember, the volume of attacks seems to be dropping quarter-over-quarter. The evidence f
Colleges and universities service a diverse group of information technology customers. Those customers generally fall into three distinct groups composed of faculty, staff, and students. Beca
Attackers have increased their attacks against Linux-based devices over the past year, taking advantage of several key factors. From general complacency to the hyperconnectivity of the public