Posts tagged Ransomware

To Maze and Beyond: How the Ransomware Double Extortion Space Has Evolved

Exposure Management

To Maze and Beyond: How the Ransomware Double Extortion Space Has Evolved

Tom Caiazza's avatar

Tom Caiazza

For Finserv Ransomware Attacks, Obtaining Customer Data Is the Focus

Industry Trends

For Finserv Ransomware Attacks, Obtaining Customer Data Is the Focus

Tom Caiazza's avatar

Tom Caiazza

For Ransomware Double-Extorters, It's All About the Benjamins — and Data From Healthcare and Pharma

Exposure Management

For Ransomware Double-Extorters, It's All About the Benjamins — and Data From Healthcare and Pharma

Tom Caiazza's avatar

Tom Caiazza

New Report Shows What Data Is Most at Risk to (and Prized by) Ransomware Attackers

Threat Research

New Report Shows What Data Is Most at Risk to (and Prized by) Ransomware Attackers

Rapid7's avatar

Rapid7

Complimentary GartnerⓇ Report "How to Respond to the 2022 Cyberthreat Landscape": Ransomware Edition

Threat Research

Complimentary GartnerⓇ Report "How to Respond to the 2022 Cyberthreat Landscape": Ransomware Edition

Tom Caiazza's avatar

Tom Caiazza

3 Takeaways From the 2022 Verizon Data Breach Investigations Report

Exposure Management

3 Takeaways From the 2022 Verizon Data Breach Investigations Report

Jesse Mack's avatar

Jesse Mack

A Year on from the Ransomware Task Force Report

Industry Trends

A Year on from the Ransomware Task Force Report

Jen Ellis's avatar

Jen Ellis

What's Changed for Cybersecurity in Banking and Finance: New Study

Exposure Management

What's Changed for Cybersecurity in Banking and Finance: New Study

Jesse Mack's avatar

Jesse Mack

4 Fallacies That Keep SMBs Vulnerable to Ransomware, Pt. 2

Exposure Management

4 Fallacies That Keep SMBs Vulnerable to Ransomware, Pt. 2

Ryan Weeks's avatar

Ryan Weeks

4 Fallacies That Keep SMBs Vulnerable to Ransomware, Pt. 1

Exposure Management

4 Fallacies That Keep SMBs Vulnerable to Ransomware, Pt. 1

Ryan Weeks's avatar

Ryan Weeks

Cybercriminals’ Recruiting Effort Highlights Need for Proper User Access Controls

Security Operations

Cybercriminals’ Recruiting Effort Highlights Need for Proper User Access Controls

Jeremy Makowski's avatar

Jeremy Makowski

Graph Analysis of the Conti Ransomware Group Internal Chats

Detection and Response

Graph Analysis of the Conti Ransomware Group Internal Chats

Rapid7's avatar

Rapid7

Conti Ransomware Group Internal Chats Leaked Over Russia-Ukraine Conflict

Threat Research

Conti Ransomware Group Internal Chats Leaked Over Russia-Ukraine Conflict

Rapid7's avatar

Rapid7

How Ransomware Is Changing US Federal Policy

Industry Trends

How Ransomware Is Changing US Federal Policy

Harley Geiger's avatar

Harley Geiger

Is the Internet of Things the Next Ransomware Target?

Threat Research

Is the Internet of Things the Next Ransomware Target?

Deral Heiland's avatar

Deral Heiland

3 Strategies That Are More Productive Than Hack Back

Detection and Response

3 Strategies That Are More Productive Than Hack Back

boB Rudis's avatar

boB Rudis

Ransomware: Is Critical Infrastructure in the Clear?

Industry Trends

Ransomware: Is Critical Infrastructure in the Clear?

Jen Ellis's avatar

Jen Ellis

The Ransomware Killchain

Industry Trends

The Ransomware Killchain

Erick Galinkin's avatar

Erick Galinkin

The Rise of Disruptive Ransomware Attacks: A Call To Action

Industry Trends

The Rise of Disruptive Ransomware Attacks: A Call To Action

boB Rudis's avatar

boB Rudis

What It Was Like to Attend Black Hat USA 2021 and DEF CON 29 in Person

Detection and Response

What It Was Like to Attend Black Hat USA 2021 and DEF CON 29 in Person

Paul Prudhomme's avatar

Paul Prudhomme

Slot Machines and Cybercrime: Why Ransomware Won't Quit Pulling Our Lever

Detection and Response

Slot Machines and Cybercrime: Why Ransomware Won't Quit Pulling Our Lever

Erick Galinkin's avatar

Erick Galinkin