Blog

23 February, 2022

Archiveus Trojan: A Part of the History of Modern Ransomware

Gaining an understanding of the Archiveus Trojan is important, due to its influence on modern ransomware. As one of the earliest examples of ransomware code created, it stands as one of the f
Cary Kostka
22 February, 2022

U.S. Seizes Ransoms, Promises Pre-Emptive Strikes Against Threat Groups

The German city of Munich recently hosted two security conferences which, for different reasons, could turn into globally significant reference points for years to come. The first, the annual
John E. Dunn
18 February, 2022

NFL Team Sacked by Ransomware

Like the rest of us, those in the San Francisco 49ers organization had its sights set on enjoying the festivities and contagious atmosphere of the Super Bowl. But their ability to enjoy the p
Cary Kostka
17 February, 2022

To Understand Ransomware’s Origins, Follow the Money

Where do the billions of dollars extorted by ransomware criminals end up? Obviously, that cryptocurrency ends up in someone’s bank account before reappearing in the tills of luxury watch sh
John E. Dunn
16 February, 2022

Working with an MSSP During a Ransomware Attack

There is a lot of excellent advice readily available about how to protect against ransomware attacks. But the unfortunate truth for many organizations is that, much like Alanis Morrissette, i
Allan Liska
15 February, 2022

Anatomy of a Ransomware Incident

Ransomware, at its core, is structured to be as loud as possible. Threat actors rely on the ability to impact as many systems as possible, as quickly as possible, to incentivize their victims
Kirstie Failey
14 February, 2022

Ransomware Group Launches Colonial Pipeline-Style Attack on German Fuel Companies

Europe just experienced a smaller but still alarming version of last May’s Colonial Pipeline attack in the U.S., as two large German fuel storage companies were taken offline by ransomware.
John E. Dunn
07 February, 2022

The Nuts and Bolts of an RDP Ransomware Attack

Let’s take a look at the ways an RDP ransomware attack occurs, from the most obvious to the more subtle. The Brute Force Attack: Ransomware via Attrition Brute force attacks are an extremel
James Panetti
03 February, 2022

Mobile Phone Ransomware: a Primer

Mobile phones are certainly ubiquitous—85% of Americans currently own a smartphone, and in 2020, 3.5 billion people owned a smartphone worldwide. With so many devices out there, it seems li
Lindsay Kaye
1 26 27 28 29 30 33
Share via
Copy link
Powered by Social Snap