Blog

27 June, 2022

The 7 Key Ingredients of IR Efficacy

Sponsored Post: Paul Ashwood, CrowdStrike Senior Product Marketing Manager, Incident Response When a breach occurs, time is of the essence. The decisions you make on who to partner with and h
Paul Ashwood
27 June, 2022

Honeypots and Ransomware

We’ve all heard the adage “You can catch more flies with honey than vinegar.” The phrase dates back to 1666, where it appeared as an Italian proverb. However, the principle remains true
Brad Rudisail
24 June, 2022

We Want Your Ransomware Stories!

I’m a private pilot (although dormant), and used to own my own little plane. It was a fun hobby, until I moved, my mortgage doubled, and I decided I couldn’t afford to own a plane anymore
Keith Ward
23 June, 2022

Ransomware Attack Offers Stolen Data Lookup on Public Website

For most of us, the chance of being caught up in a data breach is just another hazard of online life. Personally identifiable information (PII) is stolen from a company we have an association
John E. Dunn
22 June, 2022

Ransomware Actors Are Finding New Ways To Target Linux

Once upon a time, Linux was thought of as being the most secure from ransomware of all operating systems. This reputation stemmed from its relatively low adoption rate when compared to Micros
Cary Kostka
21 June, 2022

‘Cheerscrypt’ Ransomware Targets Virtual Machines

I recently outlined the many methods of ransomware infection to showcase the ways ransomware can gain a foothold. Cheerscrypt adds yet another: VMware ESXi servers, which many organizations r
James Panetti
20 June, 2022

How Ransomware Gangs Avoid Sanctions

The U.S. has a way to cut off funding to some ransomware gangs, and it works—but it’s seldom used. If the U.S. has economic sanctions against a nation (Iran, Russia, and North Korea, for
Katherine Gorham
17 June, 2022

Exchange Server’s Growing Ransomware Problem

If you had to name a piece of software cybercriminals look to target, Microsoft’s Exchange Server would surely be near the top of the list. To its huge user base, it’s the perfect DIY in-
John E. Dunn
16 June, 2022

Ransomware vs. Malware: What’s the Difference?

With the Russian invasion of Ukraine came the deployment of several destructive malware families, known as “wipers,” against entities in Ukraine, with nine distinct variants observed to d
Lindsay Kaye
1 17 18 19 20 21 33
Share via
Copy link
Powered by Social Snap