Honeyfiles and honeypots are becoming an increasingly important strategy against ransomware. This is because ransomware attacks continue to surge, and new ways of extorting payments are constantly being developed. Because of this, honeypots and their close cousin, honeyfiles, help root out the bad guys before they compromise your network.A bit of history helps here. When […]
While we still refer to them as ransomware attacks, such incidents are no longer just about encrypting the files of a targeted victim. Ransomware attacks today are about gaining leverage on someone using whatever means necessary to get paid.The principle of a double extortion strategy is simple. If the first extortion approach isn’t producing the […]
Someone out there in Internet-land is extremely angry with the LockBit ransomware group.So angry, in fact, that on the weekend of August 21 they decided to hit the group’s Tor leaks sites with a DDoS attack large enough to take them offline.It’s the sort of thing that probably happens all the time on the dark […]
We write a lot about how to prevent ransomware attacks, and though prevention is the best defense, there’s no such thing as perfect security. Is your network prepared to withstand a ransomware attack that’s slipped past the gates? The “Zero Trust” model offers a solution to ensure your organization can bounce back quickly, even after […]
When we think of a ransomware attack, some of the first things that come to mind are what we’ve seen on TV and in the movies: someone logs into a server and sees a big red screen demanding Bitcoin.There are quite a few misconceptions that go along with some of this imagery, and unless we […]
Imagine this: Someone from your public relations team reaches out to you saying they have an email from a reporter asking if your organization was the victim of a ransomware attack. “Of course not,” you respond, “we would absolutely know if we were hit by ransomware!”The public relations person then tells you that the reporter […]