Explore >> Select a destination


You are here

www.coveware.com
| | www.securitymagazine.com
11.0 parsecs away

Travel
| | Ransomware is nothing new. But the tactics, techniques and procedures (TTPs) leveraged by threat actors have reached new levels of sophistication over the last few years. And with that growth has come an increased difficulty in protecting networks against costly attacks such as the recent DarkSide one on the Colonial Pipeline. Initially, threat actors solely used ransomware-related malware to restrict access to user data by encrypting files on individual or organizational devices. In return for the decryption key, victims were required to pay a ransom . . .
| | joellatto.com
13.5 parsecs away

Travel
| | I believe there's a pretty clear consensus within the industry that ransomware should not be mistaken anymore to limit itself to just encrypting files and demanding payment for a decryption key. Dubbed by F-Secure "Ransomware 2.0", now the standard practice for ransomware groups includes also stealing files from the target company in order to increase...
| | socprime.com
10.6 parsecs away

Travel
| | Boost your defense against the escalating ransomware threat with detailed industry guidelines developed by the SOC Prime Team.
| | blog.nettitude.com
62.1 parsecs away

Travel
| Do your organisations current security measures satisfy the following five functions in the event of a cyber-attack?