Europe just experienced a smaller but still alarming version of last May’s Colonial Pipeline attack in the U.S., as two large German fuel storage companies were taken offline by ransomware.
Let’s take a look at the ways an RDP ransomware attack occurs, from the most obvious to the more subtle. The Brute Force Attack: Ransomware via Attrition Brute force attacks are an extremel
Mobile phones are certainly ubiquitous—85% of Americans currently own a smartphone, and in 2020, 3.5 billion people owned a smartphone worldwide. With so many devices out there, it seems li
The world might just have experienced its first ever hacktivist ransomware attack. It came by way of a claim by campaigners opposed to the regime of President Lukashenko that they encrypted c
QNAP Network Attached Storage (NAS) devices have been hit hard by the “DeadBolt” ransomware, leaving thousands without access to their files. The ransomware was first detected in th
When we think of ransomware, we often imagine a single user’s desktop suddenly hijacked by a ransom message threatening to lock away their hard drive data. The landscape is evolving, howeve
Ransomware is a growing threat for everyone, that much is clear. End it affects every major operating system (OS), but not all of them equally. So, which OS is safer – Windows or Linux? Tho
Sponsored Post: Nasuni Welcome to 2022. Not only is ransomware still here, but it’s not going away any time soon. Ransomware hits a business every 11 seconds, according to CyberSecurity Ven
The emergence of ransomware-as-a-service (RaaS) has produced an eerily successful business model. It provides a would-be attacker with turnkey software that can easily be leveraged to stage a