Where do the billions of dollars extorted by ransomware criminals end up? Obviously, that cryptocurrency ends up in someone’s bank account before reappearing in the tills of luxury watch sh
There is a lot of excellent advice readily available about how to protect against ransomware attacks. But the unfortunate truth for many organizations is that, much like Alanis Morrissette, i
Ransomware, at its core, is structured to be as loud as possible. Threat actors rely on the ability to impact as many systems as possible, as quickly as possible, to incentivize their victims
Europe just experienced a smaller but still alarming version of last May’s Colonial Pipeline attack in the U.S., as two large German fuel storage companies were taken offline by ransomware.
Let’s take a look at the ways an RDP ransomware attack occurs, from the most obvious to the more subtle. The Brute Force Attack: Ransomware via Attrition Brute force attacks are an extremel
Mobile phones are certainly ubiquitous—85% of Americans currently own a smartphone, and in 2020, 3.5 billion people owned a smartphone worldwide. With so many devices out there, it seems li
The world might just have experienced its first ever hacktivist ransomware attack. It came by way of a claim by campaigners opposed to the regime of President Lukashenko that they encrypted c
QNAP Network Attached Storage (NAS) devices have been hit hard by the “DeadBolt” ransomware, leaving thousands without access to their files. The ransomware was first detected in th
When we think of ransomware, we often imagine a single user’s desktop suddenly hijacked by a ransom message threatening to lock away their hard drive data. The landscape is evolving, howeve