Posts tagged Ransomware

Black Basta Ransomware Campaign Drops Zbot, DarkGate, and Custom Malware

Detection and Response

Black Basta Ransomware Campaign Drops Zbot, DarkGate, and Custom Malware

Tyler McGraw's avatar

Tyler McGraw

Ransomware Groups Demystified: CyberVolk Ransomware

Detection and Response

Ransomware Groups Demystified: CyberVolk Ransomware

Rapid7 Labs's avatar

Rapid7 Labs

Ransomware Groups Demystified: Lynx Ransomware

Detection and Response

Ransomware Groups Demystified: Lynx Ransomware

Rapid7 Labs's avatar

Rapid7 Labs

Our 4 Essential Strategy Takeaways from the Gartner® 2024 Report – How to Prepare  for Ransomware Attacks

Detection and Response

Our 4 Essential Strategy Takeaways from the Gartner® 2024 Report – How to Prepare for Ransomware Attacks

Rapid7's avatar

Rapid7

Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

Detection and Response

Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

Christiaan Beek's avatar

Christiaan Beek

Key Takeaways From The Take Command Summit: Unlocking Security Success

Detection and Response

Key Takeaways From The Take Command Summit: Unlocking Security Success

Emma Burdett's avatar

Emma Burdett

Rapid7’s Ransomware Radar Report Shows Threat Actors are Evolving …Fast.

Threat Research

Rapid7’s Ransomware Radar Report Shows Threat Actors are Evolving …Fast.

Tom Caiazza's avatar

Tom Caiazza

VMware ESXi CVE-2024-37085 Targeted in Ransomware Campaigns

Detection and Response

VMware ESXi CVE-2024-37085 Targeted in Ransomware Campaigns

Rapid7's avatar

Rapid7

Ongoing Malvertising Campaign Leads to Ransomware

Detection and Response

Ongoing Malvertising Campaign Leads to Ransomware

Tyler McGraw's avatar

Tyler McGraw

Ongoing Social Engineering Campaign Linked to Black Basta Ransomware Operators

Detection and Response

Ongoing Social Engineering Campaign Linked to Black Basta Ransomware Operators

Rapid7's avatar

Rapid7

Layered Defense to Stop Attacks Before they Begin

Detection and Response

Layered Defense to Stop Attacks Before they Begin

Dina Durutlic's avatar

Dina Durutlic

Exploring the (Not So) Secret Code of Black Hunt Ransomware

Threat Research

Exploring the (Not So) Secret Code of Black Hunt Ransomware

Anna Širokova's avatar

Anna Širokova

2023 Ransomware Stats: A Look Back To Plan Ahead

Threat Research

2023 Ransomware Stats: A Look Back To Plan Ahead

Christiaan Beek's avatar

Christiaan Beek

GhostLocker - A “Work In Progress” RaaS

Detection and Response

GhostLocker - A “Work In Progress” RaaS

Natalie Zargarov's avatar

Natalie Zargarov

Ransomware-as-a-Service Cheat Sheet

Detection and Response

Ransomware-as-a-Service Cheat Sheet

Rapid7's avatar

Rapid7

Nearly 19,000 ESXi Servers Still Vulnerable to CVE-2021-21974

Detection and Response

Nearly 19,000 ESXi Servers Still Vulnerable to CVE-2021-21974

Erick Galinkin's avatar

Erick Galinkin

Evasion Techniques Uncovered: An Analysis of APT Methods

Detection and Response

Evasion Techniques Uncovered: An Analysis of APT Methods

Christiaan Beek's avatar

Christiaan Beek

Ransomware Campaign Compromising VMware ESXi Servers

Detection and Response

Ransomware Campaign Compromising VMware ESXi Servers

Caitlin Condon's avatar

Caitlin Condon

Increasing The Sting of HIVE Ransomware

Detection and Response

Increasing The Sting of HIVE Ransomware

Eoin Miller's avatar

Eoin Miller

The 2022 SANS Top New Attacks and Threats Report Is In, and It's Required Reading

Detection and Response

The 2022 SANS Top New Attacks and Threats Report Is In, and It's Required Reading

Tom Caiazza's avatar

Tom Caiazza

Architecting for Extortion: Acting on the IST’s Blueprint for Ransomware Defense

Threat Research

Architecting for Extortion: Acting on the IST’s Blueprint for Ransomware Defense

Erick Galinkin's avatar

Erick Galinkin