The ransomware landscape has changed a great deal over the past ten
years. Today, ransomware attacks are driven by three primary factors—
ransomware-as-a-service, extortion, and cryptocurrency—and each of
these variables influences the overall threat of ransomware in distinctly
different ways.
Download this...
Worst-case scenario: Ransomware gets through defenses. It's now a game of "Beat the Clock." David Finley of Dell Technologies and Andrew Peters of Unisys detail the cyber recovery road map and how to generate a plan to both respond to and recover from the attack.
In this interview with Information Security Media...
The debilitating Colonial Pipeline attack in 2021, which cost the organization $4.4 million to restore the data, highlights the devastating consequences of ransomware and why nearly one in three companies hit with an attack is likely to pay the fee.
Download this CISO Guide from Abnormal Security CISO Mike...
Understanding customer identities in the digital world is no easy feat: In the US, the average household has 10+ connected devices, and the average adult has 4 credit cards and over 100 online accounts.
Fraud teams must cut through the clutter to single out good and bad users, regardless of how many devices,...
Swissport, a global company that provides aviation-related services, confirmed it was hit by a ransomware attack on Thursday. The incident has now been contained, and a full system cleanup and recovery process is underway with no significant delays in sight, a company spokesperson says.
The ransomware operation known as Alphv - aka BlackCat - appears to be a reboot of the DarkSide group, which rebranded as BlackMatter following serious encryption and victim-selection mistakes. Amid reports that Alphv has disrupted 17 oil terminals in Western Europe, how long until the next rebrand?
A large-scale cyberattack has disrupted operations at oil terminals in Belgium, Germany and the Netherlands with ransomware affecting fuel distribution, oil storage and transport around the world, including Oiltanking in Germany, SEA-Invest in Belgium and Evos in the Netherlands.
Four ISMG editors discuss important cybersecurity issues, including misconceptions around Zero Trust implementation, lessons learned from the crippling NotPetya malware attack of 2017 that nearly sank logistics giant Maersk and how a Russian cyberwar in Ukraine could move beyond its borders.
A New York federal court has recommended the dismissal of a class action lawsuit filed against medical practice management vendor Practicefirst in the aftermath of a 2020 ransomware attack that involved data exfiltration and affected the personal and health information of 1.2 million individuals.
A popular British supplier of crisps revealed in a letter to grocery wholesaler Nisa on Wednesday that it had been the victim of a cyberattack. KP Snacks has stopped its orders, causing stores to worry that its products will be in short supply. Ransomware group Conti is allegedly behind the attack.
The security world continues its fight against potential widespread exploitation of the critical remote code execution vulnerability - tracked as CVE-2021-44229 - in Apache's Log4j software library, versions 2.0-beta9 to 2.14.1, known as "Log4Shell" and "Logjam." This is a digest of ISMG's updates.
The House Oversight and Reform Committee today advanced its version of the Federal Information Security Modernization Act of 2022, which entails cybersecurity updates for federal civilian agencies. The bipartisan measure was sent to the full House on a voice vote.
Despite the rise in frequency and severity of ransomware attacks, there remain misconceptions in how to respond. Praveen Vunnava of Veritas and David Totten of Microsoft reveal how to build a comprehensive strategy based on three key principles: protect, detect and recover.
We thought it was bad enough when traditional ransomware started to steal data in its second generation of evolution, now dubbed "double extortion". The third stage of ransomware is beginning to happen now and will make us wish for the good, old days of Ransomware 2.0.
Attend this presentation to learn how...
Download this eBook and learn about:
The ransomware risk to Bupa Global;
How detection and response needs to keep pace;
Lessons learned from his own experience with ransomware defense.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.