Ransomware’s evolution away from encryption continues, according to this article from The Register. To be clear, ransoms are still being demanded and paid. But instead of being forced to pa
As anyone who works in cybersecurity will already know, North Korea has made a big investment in its cyberattack capability, with ransomware a feared specialty. For that reason, a warning las
Over the past 18 months, there have been a lot of headlines involving ransomware and other types of cyberattacks involving Microsoft Exchange Server environments. Last March, a single cyber e
When discussing the ever-changing ransomware threat landscape, we often talk about what devices threat actors will target next. In addition to mobile devices, the other technology I get asked
Because Microsoft Exchange is so often targeted by ransomware gangs and other malicious organizations, it’s critical to do everything possible to secure your Exchange environment. And for o
One of the biggest internal debates facing ransomware recovery planners is whether to pay an extortion demand or fall back on a process of internal data recovery. Increasingly, however, victi
A critical and often underestimated resource in the fight against malware is the industry’s history of finding and reporting software flaws in everything from big-brand programs to websites
There is a definite cool factor concerning the use of honeypots to hunt down an elusive hacker. Deploying a honeypot or two across your network is like creating a spy network within your orga
Ransomware targeting VMware hosts is rapidly on the rise, and Black Basta is one of the latest jumping on the bandwagon. Like most ransomware, this relative newcomer first targeted Windows sy