The history of ransomware, although not long, is certainly notable. And understanding a little of the history of this plague can provide insights that might help you better protect your organization. Knowing how ransomware has evolved over the years is valuable information, as it takes you inside the mind of a ransomware actor.Ransomware.org is one […]
The LockBit ransomware operators have had a busy new year, with a notable attack on Britain’s Royal Mail that disrupted the postal service’s ability to send international letters and parcels: Royal Mail ransomware attackers threaten to publish stolen data. However, it seems that there are some targets LockBit feels should be off-limits.When LockBit’s ransomware was […]
Even if you aren’t worried quite yet about the increasing ease of writing malware, you should probably be deeply, deeply concerned about the major credential and personally identifiable information (PII) thefts that have happened over the past year or so. Here are just a few:Getting access to networks is especially easy right now. There have […]
It just keeps getting easier to create ransomware. Last year, schoolkids were doing it. Just last month, ransomware went open source. And now ChatGPT is enabling script kiddies to write functional malware. But just how big a threat is this, really?In the real world, the part where AIs can write code isn’t particularly scary. Yes, […]
Sponsored Post: Bart Lenaerts-Bergmans, Senior Product Marketing Manager, Intel, CrowdStrikeThe transaction details and monetization patterns of modern cybercrime reveal critical insights for organizations defending against ransomware attacks. Cybercrime has evolved over the past several years from simple “spray and pray” attacks to a sophisticated criminal ecosystem centered around highly effective monetization techniques that enable adversaries to […]
Sponsored Post: Bart Lenaerts-Bergmans, Senior Product Marketing Manager, Intel, CrowdStrike Financially motivated criminal activities, aka “eCrime,” happen in waves. They come and go as adversaries develop new tools and target vulnerable victims. Similar to how investors track stock market activity using various indexes, CrowdStrike monitors eCrime using multiple observables and codifies the activity in the […]