Ransomware

Ransomware | News, how-tos, features, reviews, and videos

Ransomware  >  A masked criminal ransoms data for payment.

Four states propose laws to ban ransomware payments

Some state legislatures are debating bills that could limit or ban ransom payments. A better option, experts say, is mandatory reporting of ransomware attacks.

healthcare data breach / medical patient privacy security violation

5 biggest healthcare security threats for 2021

Healthcare organizations can expect ransomware, botnets, cloud misconfigurations, web application attacks, and phishing to be their top risks.

ransomware breach hackers dark web

Unique TTPs link Hades ransomware to new threat group

New research exposes details of Gold Winter threat group that links it to the infamous Hades ransomware.

locked data / bitcoins

Feds seize $2.3 million in cryptocurrency wallet reportedly used in Colonial Pipeline ransomware attack

The successful seizure could encourage other victims to better cooperate with federal agencies and cause ransomware gangs to rethink their operations.

USA / United States of America stars + stripes and binary code superimposed over The White House

Ransomware response: What CISOs really want from the federal government

What should the federal government's role and responsibility be regarding ransomware? Security leaders weigh in.

A Colonial Pipeline facility in Baltimore, Maryland, USA, 10 May 2021.

Colonial Pipeline take-away for CISOs: Embrace the mandates

The DarkSide attack on Colonial is yet another wake-up call for companies to harden their systems against ransomware. History suggests that might not happen despite new government guidance.

CSO > Invalidated cyber insurance

17 cyber insurance application questions you'll need to answer

Recent high-profile security incidents have tightened requirements to qualify for cyber insurance. These are the tougher questions insurance carriers are now asking.

DDOS attack

DDoS attacks: Stronger than ever and increasingly used for extortion

Low cost and ease of execution drive a resurgence in distributed denial of service attacks as criminals profit from extorting victims.

ransomware breach hackers dark web

DarkSide ransomware explained: How it works and who is behind it

The Colonial Pipeline attack thrust the DarkSide ransomware into the spotlight. This is what's known about the threat actors and how they operate.

data pipeline primary

Colonial Pipeline shutdown highlights need for better OT cybersecurity practices

Experts weigh in on what the Colonial attack teaches critical infrastructure providers about preparation and incident response.

Ransomware  >  A masked criminal ransoms data for payment.

How malicious Office files and abused Windows privileges enable ransomware

Ransomware groups most often gain entry to Windows networks through malicious Office documents and then move laterally by abusing Windows privileges. Here's how to defend against both.

locked data / bitcoins

Task force proposes framework for combatting ransomware

A diverse coalition of experts from business and the public sector present 48 recommendations for solving the ransomware crisis, including international cooperation and regulating cryptocurrencies.

ransomware attack

Ryuk ransomware explained: A targeted, devastatingly effective attack

Ryuk ransomware attacks are targeted to the most vulnerable, most likely to pay companies and are often paired with other malware such as TrickBot.

ransomware

5 reasons why the cost of ransomware attacks is rising

The ransom is still a tiny portion of the total cost of a ransomware attack, but associated costs are increasing.

Ransomware  >  A coin-operated lock ransoming an encrypted system.

Egregor ransomware group explained: And how to defend against it

Egregor is one of the most rapidly growing ransomware families. It employs "double ransom" techniques to threaten reputational damage and increase pressure to pay.

ransomware breach hackers dark web

Egregor ransomware takes a hit after arrests in Ukraine

Ukrainian, French and US operation targets ransomware group members and takes down its infrastructure.

locked data / bitcoins

How ransomware negotiations work

Here's what experienced negotiators say your organization should expect if it ever needs to pay a ransomware demand.

spider dark web bug virus poisonous threat weave pattern by steve norris getty

Sprite Spider emerging as one of the most destructive ransomware threat actors

Having flown under the radar for several years, the Sprite Spider group is using a ransomware code suite that is effective and hard to detect.

CSO  >  Botnets

Law enforcement takes over Emotet, one of the biggest botnets

Multi-national cooperation removes this key malware delivery service as a threat, at least temporarily.

ransomware attack

New Intel CPU-level threat detection capabilities target ransomware

The new capabilities in the Intel mobile processors will make it harder for ransomware to avoid detection.

Load More