Blog

14 April, 2022

6 Tips for Catching Windows Ransomware Early

Windows servers and clients are by far the No. 1 operating systems targeted by ransomware, and the attacks are only growing in sophistication, often attacking servers via Remote Desktop Proto
James Panetti
13 April, 2022

North Carolina College Gets Ransomware Education

Ransomware attackers have shown their willingness to target the higher levels of U.S. education. North Carolina A&T State University was the target of a ransomware attack in March 2022, b
Cary Kostka
12 April, 2022

Russian Criminals Created Conti To Attack The World—Now It’s Being Used To Attack Russia

Just when you think ransomware criminals have exhausted their box of surprises, up pops something brand new nobody saw coming. The latest example, first reported by Bleeping Computer, is a di
John E. Dunn
08 April, 2022

Ransomware’s Hidden Connection To Moscow’s Swankiest Skyscraper

Moscow’s Federation Tower is not particularly famous outside Russia, yet thousands of ransomware victims across the world might have an unwelcome connection to some of the companies operati
John E. Dunn
07 April, 2022

Public Entities in North Carolina Barred from Paying Ransoms

Public entities in North Carolina are prohibited from paying a ransom demand following an attack, an idea that may be spreading to other U.S. states. According to an article in the National L
Keith Ward
06 April, 2022

‘Living Off the Land’ Ransomware

This month, our focus is on living-off-the-land techniques, and why they help ransomware threat actors execute attacks more stealthily. The concept of living-off-the-land (LotL) was first int
Lindsay Kaye
01 April, 2022

Social Engineering Remains a Common Ransomware Tactic

Often in the ransomware world, the oldest, most common methods of hacking an organization remain the most effective. That includes social engineering, which, although some feel is less effect
Keith Ward
31 March, 2022

Will a Factory Reset Remove Ransomware?

There is no doubt that the reset option for computing devices has changed has proved a game changer. It’s the chance to start over once again with a clean slate. For enterprises that manage
Brad Rudisail
31 March, 2022

Nowhere to Hide: Access Brokers

Sponsored Post: The CrowdStrike Falcon OverWatch Team  The CrowdStrike Falcon OverWatch™ annual threat hunting report, Nowhere to Hide, details the interactive intrusion activity observed
Nick Lowe
1 22 23 24 25 26 33
Share via
Copy link
Powered by Social Snap