Power / Energy
Ransomware black hole pulls in other cyberthreats to create one massive delivery system
The gravitational force of ransomware's black hole is pulling in other cyberthreats to form one massive, interconnected ransomware delivery system with significant implications for IT security.
Cybersecurity experts weigh in on BlackMatter ransomware shut down
Given the lucrative activity of RaaS we are likely to see them reappear in the near future. The battle against ransomware is far from over.
Research uncovers connection between BlackMatter and DarkSide ransomware-as-a-service
Speaking about the two ransomware types, Sophos says it's not a simple case of rebranding.
How Microsoft security infrastructure can sink a business
Organisations that are heavily or entirely reliant on Microsoft infrastructure, services and applications can take several steps to shore up their security.
Minimising the impact of REvil delivered via Kaseya servers
In this case study, Darktrace explains how it detected the first signs of ransomware on the network 'as soon as encryption had begun'.
Ransomware-as-a-service rising as cyber threats grow at alarming rates
Attacks are driven largely by the emergence of Ransomware as a Service gangs that are cashing in on critical infrastructure organisations.
Recent high profile cyber attacks show rising threat of ransomware-as-a-service
"This trend of ransomware-as-a-service is continuing to evolve and cybersecurity providers need to stay ahead of the risk."
Ransomware decreases as criminals customise attacks on larger, more lucrative targets - McAfee Report
McAfee has released its latest cybersecurity report analysing cybercriminal activity related to malware and cyber threats in the first quarter of 2021.
New ransomware Epsilon Red discovered - how it works
New ransomware Epsilon Red has been found by Sophos researchers who detail the tools, techniques, procedures, and behaviour of the attackers behind it.
How to shore up cyber-defences of financial institutions for the future
Accenture’s latest research defined four key risks: Supply chain attacks, cyber-fraud, insider threats and extortion and ransomware.
Report reveals which industries are most vulnerable to new ransomware attacks
Zscaler has announced its new Ransomware Report highlighting the most prolific ransomware actors, their attack tactics, and the industries being targeted.
Ransomware attacks surge in 2021, Triple Extortion threat comes to light
Ransomware attacks have seen 102% increase this year compared to the beginning of 2020, and there are no signs of it slowing down.
A brief history of cyber-threats — from 2000 to 2020
Many significant cybersecurity events have occurred since the year 2000 — not every one of them ‘firsts’, but all of them correlating with a change in security behaviour or protection.
The current state of ransomware — and its future
Discoveries made by analysts at Sophos have unearthed a new development: ransomware code appears to have been shared across ‘families’, and some of the ransomware groups seemed to work in collaboration more than in competition with one another.
The rising threat of human-controlled ransomware
Until recently, most ransomware attacks have been automated affairs. But things are changing, writes Attivo Networks regional director for A/NZ Jim Cook.
Sophos deconstructs Dharma, the 'fast food franchise' ransomware
"Dharma is fast-food franchise ransomware: widely and easily available to just about anyone,” says a Sophos threat researcher.
The real winner of 2019? Ransomware
Trend Micro discovered a 10% increase in ransomware detections, despite a 57% decrease in the number of new ransomware families.
Opinion: 4 Ransomware trends to watch in 2019
Recorded Future's Allan Liska looks at the past big ransomware attacks thus far to predict what's coming this year.
Ransomware infection? Here’s how you control the damage
Ransomware has evolved to be more sophisticated and targeted, and remains a threat to businesses of all sizes.
Just how dark is the dark web? The rise of Ransomware-as-a-Service
These packages allow individuals with little technical skill, to attack businesses and individuals with relative ease.