On Nov. 7, the ALPHV ransomware group targeted the network of financial services company MeridianLink and, according to the group, stole files. No encryption was involved but, the group claim
Who are the people the ransomware groups most rely on for their business model? Most commentators fall back on the conventional view that the ransomware industry’s main protagonists are the
Sponsored Post: Nasuni. As we enter week four of National Cybersecurity Awareness Month (NCSAM), it’s worth making the connection between ransomware and your overall business continuity str
Sponsored Post: Nasuni. As we all know, it is very difficult to protect large file servers using traditional backup solutions. Organizations have been founded with the sole purpose to create
Imagine a world where ransomware victims across the globe simply refused to pay their attackers. In theory, the attackers would quickly realize their extortion business model no longer made a
Spend any time studying official cyberattack disclosures and two words that crop up with striking regularity are “sophisticated” and “targeted.” Every attack is said to be sophisticat
Initial Access Brokers: Who Are They? It’s not often that we get to peer deeply into the structure and organization of cybercrime, gaining insights beyond the superficial damage we witn
Sponsored Post: Nasuni. Ransomware is everywhere: According to Enterprise Strategy Group (ESG), 73% of organizations have been the victim of a successful ransomware attack that resulted in fi
Sponsored Post: Palo Alto Networks. One of the most impactful cybersecurity strategies an organization can employ is the use of tabletop exercises. These simulated ‘what-if’ scena