Defense-in-Depth: A Layered Strategy for Modern Cybersecurity
This post explores Defense-in-Depth, a comprehensive strategy with a multi-layered approach to modern threat protection.
Ransom malware, or ransomware, is malicious software that prevents users from accessing their system, personal files, and other data—typically through encryption—while demanding a ransom payment to reinstate access. Alternatively, ransomware campaigns may threaten to publish personal or sensitive materials if a ransom is not paid.
This post explores Defense-in-Depth, a comprehensive strategy with a multi-layered approach to modern threat protection.
This post unpacks the criminal elements in the ransomware ecosystem: from developers and distributors to negotiators and even PR specialists.
Modern cyber risk management requires understanding ransomware. This post covers the basics from infiltration to extortion, as well as prevention and protection.
This broad overview of cybercrime includes the main types of cybercrime, underlying motivations, societal impact, and tactics for prevention.
Threat Advisory: Attackers are using file-sharing services like Smash or WeTransfer to deliver Bumblebee malware disguised as RFPs.
The latest string of attacks using Qakbot malware are breaching networks and successfully deploying ransomware in less than half a day.
A Global Cobalt Strike activity trend analysis over Q1 of 2022 offers situational awareness into one of the most prevalent attack frameworks.
The Strengthening American Cybersecurity Act is necessary to protect the Nation’s critical infrastructure. But is it enough?
As ransomware insurance demand spikes along side of extortion demands, insurers are imposing strict requirements and coverage limitations to mitigate losses.
Commonly used by eCrime groups like Wizard Spider, the return of Emotet foreshadows a potential surge in ransomware attacks.