Earlier this year, Russian law enforcement arrested 14 members of the notorious REvil ransomware gang and dismantled their networks. It seemed like a successful takedown. But now REvil–or s
Despite the headline-grabbing multi-million dollar (or even larger) ransom demands, ransomware may not be the costliest cybercrime. Business e-mail compromise (BEC) is a less-publicized but p
Contemplating payment in lieu of a ransomware attack is a precarious decision at best. It’s a problematic situation with few options. In a previous article we outlined the reasons why you m
It was just over a year ago that Colonial Pipeline was brought down with a devastating ransomware attack. Within 24 hours of discovering the ransom note, CEO Joseph Blount made the decision t
Ransomware is a hot topic in IT circles today that solicits hypothetical questions such as, should you pay the ransom? It’s a question that creates interesting fodder, and one that’s answ
A reliable backup process is the backbone of any disaster recovery plan. But what type of backup is superior when it comes to ransomware recovery? Are the old tried-and-true physical backups
How realistic would it be for ransomware to successfully exploit weaknesses in the obscure firmware systems running inside PCs? There’s certainly a lot of things to aim at, ranging from the
Back in April, the North Carolina State Legislature became the first state to approve a law banning ransomware payments by government agencies. The law, which was part of the Current Operatio
In less than a decade, ransomware has turned from something tech people discussed at cybersecurity conferences to a phenomenon that fills news websites with tales of damage and desperation on