Blog

17 March, 2022

The First Ransomware Attack: Lessons Learned from History

It may come as a surprise to many that ransomware is now entering its fourth decade of existence. The first known occurrence of ransomware, called the AIDS Trojan, was released in 1989. With
Cary Kostka
16 March, 2022

The Surprisingly Short Life of a Ransomware Threat Group

How many ransomware threat groups have become household names over the last decade? The answer, surprisingly, is none. Ransomware groups typically spring from nowhere, achieve a degree of not
John E. Dunn
16 March, 2022

More Phishing Attacks = More Ransomware

ActualTech Media moderators David Davis and Scott Bekker had an interesting discussion recently about phishing attacks and how prevalent they remain. This has special relevance to ransomware,
Keith Ward
15 March, 2022

How To Create a Phishing Tabletop Exercise

An essential element in being prepared to respond to cyber attacks, and ransomware attacks in particular, is to close the biggest and most easily breached hole in an any organization’s
Chris Minnick
14 March, 2022

Exploring Ransomware History and Origins Are Key To Understanding Modern Tactics

Ransomware attacks are increasing at an alarming rate worldwide. In response, knowledge of ransomware history and ransomware origins must also increase. This will help you respond better if y
Cary Kostka
11 March, 2022

A Ransomware/Cybersecurity Protection Checklist

The world has watched as the conflict unfolded in Ukraine. With the messaging from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and other government entities around the wo
Kirstie Failey
10 March, 2022

Ransomware Tabletop Exercise: A Real-World Example

In Part One of my series on ransomware tabletops, a company was caught unprepared when hit with a real ransomware attack. Fortunately for them, their tape backups weren’t affected by th
Chris Minnick
09 March, 2022

When Ransomware Strikes Twice—on the Same Day

What’s worse than being hit by a ransomware attack out of the blue? In early December, a Canadian organization discovered the answer in the worst possible way: get ransomed by a second, ent
John E. Dunn
08 March, 2022

5 Tips for Building a Cybersecurity Career as a Woman

I’m Lindsay, a malware analyst and reverse engineer, with a special enthusiasm for obfuscation and anti-reverse engineering techniques used in malware! I am also a woman in the field of cyb
Lindsay Kaye
1 24 25 26 27 28 33
Share via
Copy link
Powered by Social Snap