Explore >> Select a destination


You are here

threatpost.com
| | www.cybereason.com
11.4 parsecs away

Travel
| | Over the last five years ransomware operations evolved both in capabilities and the degree of organizational structure behind it. In this webinar, we'll cover the changes, what they mean and how cybersecurity strategies need to adapt to match this changing threat. But most importantly, have we learned from our past mistakes?
| | www.securitymagazine.com
10.3 parsecs away

Travel
| | Ransomware is nothing new. But the tactics, techniques and procedures (TTPs) leveraged by threat actors have reached new levels of sophistication over the last few years. And with that growth has come an increased difficulty in protecting networks against costly attacks such as the recent DarkSide one on the Colonial Pipeline. Initially, threat actors solely used ransomware-related malware to restrict access to user data by encrypting files on individual or organizational devices. In return for the decryption key, victims were required to pay a ransom . . .
| | thehackernews.com
5.9 parsecs away

Travel
| | Conti ransomware gang has shut down its infrastructure in favor of migrating its criminal activities to smaller cybercrime groups.
| | thehackernews.com
38.1 parsecs away

Travel
| The Hacker News | Cybersecurity Webinars - The Hacker News