Blog

13 May, 2022

Initial Access Vectors for Ransomware

Initial access vectors are the methods threat actors use to first gain access to an organization’s systems. They can include exploitation of vulnerabilities, stolen credentials, phishing, o
Lindsay Kaye
12 May, 2022

Has The Ukraine Conflict Disrupted Ransomware Attacks?

The war between Ukraine and Russia has disrupted the business model of ransomware attackers, or so it’s said. It’s an idea that’s been discussed since the war began in February, and now
John E. Dunn
11 May, 2022

Useful Videos To Help Stop Ransomware

We all must work toward building a knowledgebase to address the growing threat of ransomware. Our increasing reliance on technology as a society makes it imperative that each of us understand
Cary Kostka
10 May, 2022

Setting Post-Ransomware-Attack Priorities

Ransomware moves fast—so fast that there’s a new statistic that security companies are using, called “Time-to-Ransom,” or TTR. This can be defined as the time between initial compromi
Kirstie Failey
09 May, 2022

Costa Rica Declares National Emergency After Ransomware Attacks

A series of ransomware attacks against Costa Rican national infrastructure has prompted the country’s new president to declare a national emergency. First reported by BleepingComputer, the
Keith Ward
06 May, 2022

Has REvil REturned?

They’re baaaccckkkk. The notorious ransomware gang REvil has popped up on the radar again, after a rough early 2022 that saw multiple members arrested by authorities. Regular ransomware wat
Keith Ward
05 May, 2022

Onyx Ransomware Damages Files So Even The Criminals Can’t Retrieve Data

Does it matter how many victims of ransomware agree to pay extortion demands? Security vendors certainly think so, which is why many publish annual or bi-annual numbers that tend to show that
John E. Dunn
04 May, 2022

Adapting an Adversary-First Approach in Ransomware Defense

Sponsored Post: By CrowdStrike While many ransomware operations rebranded in 2021, the overall number of functioning ransomware and extortion operations continue to increase. More advers
Jason Rivera
04 May, 2022

5 Reasons Ransomware Tabletop Exercises Are Critical to Disaster Recovery

In my previous overview of the topic, I likened ransomware tabletop exercises to an IT version of Dungeons & Dragons. If the idea of role-playing pretend scenarios sounds childish, think
James Panetti
1 20 21 22 23 24 33
Share via
Copy link
Powered by Social Snap