Blog

02 August, 2022

Are Honeypots and Deception Technology the Same Thing?

In the past decade we have seen cybersecurity companies releasing new products under the category of “deception technology.” For industry veterans, these solutions sound a lot like honeyp
Brad Rudisail
29 July, 2022

Are Ransomware Attacks Really Declining?

Something unexpected is happening to ransomware statistics: for the first time since anyone can remember, the volume of attacks seems to be dropping quarter-over-quarter.  The evidence f
John E. Dunn
28 July, 2022

The Need for Multifactor Authentication for Higher Ed

Colleges and universities service a diverse group of information technology customers. Those customers generally fall into three distinct groups composed of faculty, staff, and students. Beca
Steve Linthicum
27 July, 2022

Ransomware: What Are Linux Users Up Against?

Attackers have increased their attacks against Linux-based devices over the past year, taking advantage of several key factors. From general complacency to the hyperconnectivity of the public
Cary Kostka
26 July, 2022

How Vulnerable Is Online Exchange To Ransomware?

There has been a lot of media attention concerning the recent Microsoft Exchange server vulnerabilities that cybercriminals are exploiting to execute their malicious ransomware attacks. As a
Brad Rudisail
25 July, 2022

BlackCat Ransomware Targeting Microsoft Exchange Servers

The FBI released a FLASH alert in April 2022 concerning BlackCat Ransomware. Between November 2021 and March 2022, the ransomware-as-a-service (RaaS) variant encrypted the networks of at leas
Brad Rudisail
21 July, 2022

FBI Recovers Extortion Payments After North Korean Ransomware Attacks

The U.S. Justice Department has notched up  a small but potentially significant victory against ransomware after announcing the recovery of a $500,000 cryptocurrency payment extorted from tw
John E. Dunn
20 July, 2022

Top Ransomware Threat Hunting Techniques

This blog post started as a Twitter thread, in case you were wondering if anything good ever came from Twitter. Ransomware attacks are complex and involve a lot of different aspects of securi
Allan Liska
19 July, 2022

New Exploit Makes Phishing More Realistic

Don’t open attachments from strangers: it’s been standard anti-phishing advice long enough to become a cliché. So of course, purveyors of malware do their best to imitate someone you kno
Katherine Gorham
1 15 16 17 18 19 33
Share via
Copy link
Powered by Social Snap