Working remotely is a trend here to stay, and many remote workers rely on Remote Desktop Protocol (RDP) to connect to office computers. Attackers have taken note. A Hot Target in the Remote W
Sponsored Post – Ransomware Recovery What happens during a ransomware attack and why recovery is critical A ransomware attack isn’t a single event. It is a series of events designed t
Gaining an understanding of the Archiveus Trojan is important, due to its influence on modern ransomware. As one of the earliest examples of ransomware code created, it stands as one of the f
The German city of Munich recently hosted two security conferences which, for different reasons, could turn into globally significant reference points for years to come. The first, the annual
Like the rest of us, those in the San Francisco 49ers organization had its sights set on enjoying the festivities and contagious atmosphere of the Super Bowl. But their ability to enjoy the p
Where do the billions of dollars extorted by ransomware criminals end up? Obviously, that cryptocurrency ends up in someone’s bank account before reappearing in the tills of luxury watch sh
There is a lot of excellent advice readily available about how to protect against ransomware attacks. But the unfortunate truth for many organizations is that, much like Alanis Morrissette, i
Ransomware, at its core, is structured to be as loud as possible. Threat actors rely on the ability to impact as many systems as possible, as quickly as possible, to incentivize their victims