Once upon a time, Linux was thought of as being the most secure from ransomware of all operating systems. This reputation stemmed from its relatively low adoption rate when compared to Micros
I recently outlined the many methods of ransomware infection to showcase the ways ransomware can gain a foothold. Cheerscrypt adds yet another: VMware ESXi servers, which many organizations r
The U.S. has a way to cut off funding to some ransomware gangs, and it works—but it’s seldom used. If the U.S. has economic sanctions against a nation (Iran, Russia, and North Korea, for
If you had to name a piece of software cybercriminals look to target, Microsoft’s Exchange Server would surely be near the top of the list. To its huge user base, it’s the perfect DIY in-
With the Russian invasion of Ukraine came the deployment of several destructive malware families, known as “wipers,” against entities in Ukraine, with nine distinct variants observed to d
Earlier this year, Russian law enforcement arrested 14 members of the notorious REvil ransomware gang and dismantled their networks. It seemed like a successful takedown. But now REvil–or s
Despite the headline-grabbing multi-million dollar (or even larger) ransom demands, ransomware may not be the costliest cybercrime. Business e-mail compromise (BEC) is a less-publicized but p
Contemplating payment in lieu of a ransomware attack is a precarious decision at best. It’s a problematic situation with few options. In a previous article we outlined the reasons why you m
It was just over a year ago that Colonial Pipeline was brought down with a devastating ransomware attack. Within 24 hours of discovering the ransom note, CEO Joseph Blount made the decision t