The volume of malware targeting Linux devices grew 35% over the course of 2021. Some malware families stood out among the rest. For instance, XorDDoS, Mirai, and Mozi accounted for 22% of att
Victim notifications are exactly what they sound like—a notification that you have fallen victim to something. In the ever-changing world of cybersecurity, victim notifications happen more
Ransomware used to be mainly on the radar of people who worked in IT security. That is no longer the case. Even John Oliver knows about it now, and is talking about it, leading to his viral v
If you ever played tabletop role-playing games, you can think about a tabletop exercise as an IT version of Dungeons & Dragons. Pretend an attack is underway, then your team role-plays th
Can ransomware be stopped, and can you survive after an attack? Absolutely – if you’re prepared ahead of time. 1. Have a Plan and a Playbook A clearly outlined, detailed plan must be in p
Ransomware attacks have continued to plague organizations over the past few years, especially with the move to big game hunting at the end of 2019, and the debut of “double extortion” in
Bernalillo County, New Mexico, started off 2022 the victim of a ransomware attack. Not a lot is known about the attack at the time of this writing, but it has all of the hallmarks of a ransom
Businesses are increasingly being targeted by ransomware attacks. The crippling nature of these attacks makes it necessary to take precautions now. Data impacted by a ransomware attack can be
Backups Don’t Ensure Safety In years past, a solid backup process offered a reliable sense of security, but today, they are as much a target as anything else. As our visual guide explains,