Just when you think ransomware criminals have exhausted their box of surprises, up pops something brand new nobody saw coming. The latest example, first reported by Bleeping Computer, is a di
Moscow’s Federation Tower is not particularly famous outside Russia, yet thousands of ransomware victims across the world might have an unwelcome connection to some of the companies operati
Public entities in North Carolina are prohibited from paying a ransom demand following an attack, an idea that may be spreading to other U.S. states. According to an article in the National L
This month, our focus is on living-off-the-land techniques, and why they help ransomware threat actors execute attacks more stealthily. The concept of living-off-the-land (LotL) was first int
Often in the ransomware world, the oldest, most common methods of hacking an organization remain the most effective. That includes social engineering, which, although some feel is less effect
There is no doubt that the reset option for computing devices has changed has proved a game changer. It’s the chance to start over once again with a clean slate. For enterprises that manage
Sponsored Post: The CrowdStrike Falcon OverWatch Team The CrowdStrike Falcon OverWatch™ annual threat hunting report, Nowhere to Hide, details the interactive intrusion activity observed
It’s no secret that the sums demanded by ransomware extortionists have become more outrageous over the last three years. Ransomware started out as a crime against home users, with ransoms i
There’s a perceived notion that Linux is more secure than Windows when it comes to ransomware and other types of malware. But “safer by default” doesn’t mean safe out of the box. You