If you had to name a piece of software cybercriminals look to target, Microsoft’s Exchange Server would surely be near the top of the list. To its huge user base, it’s the perfect DIY in-
With the Russian invasion of Ukraine came the deployment of several destructive malware families, known as “wipers,” against entities in Ukraine, with nine distinct variants observed to d
Earlier this year, Russian law enforcement arrested 14 members of the notorious REvil ransomware gang and dismantled their networks. It seemed like a successful takedown. But now REvil–or s
Despite the headline-grabbing multi-million dollar (or even larger) ransom demands, ransomware may not be the costliest cybercrime. Business e-mail compromise (BEC) is a less-publicized but p
Contemplating payment in lieu of a ransomware attack is a precarious decision at best. It’s a problematic situation with few options. In a previous article we outlined the reasons why you m
It was just over a year ago that Colonial Pipeline was brought down with a devastating ransomware attack. Within 24 hours of discovering the ransom note, CEO Joseph Blount made the decision t
Ransomware is a hot topic in IT circles today that solicits hypothetical questions such as, should you pay the ransom? It’s a question that creates interesting fodder, and one that’s answ
A reliable backup process is the backbone of any disaster recovery plan. But what type of backup is superior when it comes to ransomware recovery? Are the old tried-and-true physical backups
How realistic would it be for ransomware to successfully exploit weaknesses in the obscure firmware systems running inside PCs? There’s certainly a lot of things to aim at, ranging from the