Imagine this: Someone from your public relations team reaches out to you saying they have an email from a reporter asking if your organization was the victim of a ransomware attack. “Of cou
On May 1 2022, an unnamed company in the automotive sector fell victim to what is surely one of the most nightmarishly contorted ransomware incidents ever reported. Hopefully, that sentence h
Ransomware attackers know that industries with the most to lose are often the best targets, since the greater the potential disruption of that industry, the greater their chances of getting p
The most notable ransomware-as-a-service (RaaS) groups are well-known for the widely publicized attacks they conduct, even outside of the cybersecurity community. However, there also exist sm
Sponsored Post: Nick Hayes, CrowdStrike Senior Product Marketing Manager. We’ve all seen the devastating impact adversaries and ransomware attacks can have on organizations—taking down cr
When tallying damages associated with a ransomware attack, the initial focus centers on calculating costs relating to the six steps detailed in the NIST Computer Security Incident Handling Gu
In some countries, kidnappings are so common that an entire industry of negotiators and consultants emerged to facilitate the exchange of ransoms and the safe recovery of victims. Many aspect
One form of ransomware quickly making a name for itself is cryptojacking. With this type of attack, bad actors work to take over any system with processing power for the purpose of harnessing
The stereotypical profile of a hacker in his parents’ basement developing and launching attacks can officially be put to rest. The geopolitical nature of executing attacks against states or