3 min
Ransomware
Complimentary GartnerⓇ Report "How to Respond to the 2022 Cyberthreat Landscape": Ransomware Edition
The complimentary GartnerⓇ report “How to Respond to the 2022 Cyberthreat Landscape"will help you understand and defend against the ransomware threat.
4 min
Ransomware
3 Takeaways From the 2022 Verizon Data Breach Investigations Report
Our takeaways from Verizon's 2022 Breach Report suggest security pros should be doubling down on the big priorities, like ransomware and supply chain.
4 min
Ransomware
A Year on from the Ransomware Task Force Report
We're marking the anniversary of the Ransomware Task Force’s (RTF) report, which offered 48 recommendations to deter and respond to ransomware attacks
3 min
Cybersecurity
What's Changed for Cybersecurity in Banking and Finance: New Study
The results of a new VMware study show a changing landscape for cybersecurity in banking and finance.
5 min
Ransomware
4 Fallacies That Keep SMBs Vulnerable to Ransomware, Pt. 2
In our second blog in this two-part series, Datto Inc. CISO Ryan Weeks outlines the third and fourth fallacies that perpetuate ransomware risk for SMBs.
5 min
Ransomware
4 Fallacies That Keep SMBs Vulnerable to Ransomware, Pt. 1
In this two-part blog series, we will present four common mistakes SMBs make when thinking about ransomware risk.
2 min
Threat Intel
Cybercriminals’ Recruiting Effort Highlights Need for Proper User Access Controls
The Lapsus$ ransomware gang’s modus operandi seems to be evolving.
4 min
Research
Graph Analysis of the Conti Ransomware Group Internal Chats
The leaked communications from the Conti ransomware group are a rich source of intelligence, and the messaging patterns provide even more insight.
7 min
Ransomware
Conti Ransomware Group Internal Chats Leaked Over Russia-Ukraine Conflict
On February 27, Twitter user @ContiLeaks released a trove of chat logs from the sophisticated ransomware group, Conti.
6 min
Ransomware
How Ransomware Is Changing US Federal Policy
The increased stakes of the ransomware threat are pushing regulators to take a harder look at whether regulatory requirements for cybersecurity safeguards are effective.
3 min
Ransomware
Is the Internet of Things the Next Ransomware Target?
What would it take for IoT to be the target of ransomware? This post takes a closer look.
4 min
Ransomware
3 Strategies That Are More Productive Than Hack Back
Hack back, as used by non-government entities, is problematic for many reasons. Here are 3 alternative strategies to thwart the attackers.
10 min
Ransomware
Ransomware: Is Critical Infrastructure in the Clear?
Is critical infrastructure in the clear, is it a specific target of ransomware attackers, or is it simply on the same footing as any other organization?
5 min
Ransomware
The Ransomware Killchain
How does a machine go from one that's working perfectly fine to one that's inoperable due to ransomware? This post takes a close look.
8 min
Ransomware
The Rise of Disruptive Ransomware Attacks: A Call To Action
Ransomware attacks are on the rise. In this post, we examine the dynamics of this trend and where it might be headed.