Tag: ransomware
Night Blood: A Global Ransomware Campaign Run by APT Group TA505
The TA505, a Russian-speaking APT group, created a buzz early last year with a devastating ransomware attack on the Maastricht University (UM) in the...
Ransomware: A Pandemic Plaguing the Digital World
It seems the bad guys in cyberspace decided to forego their holidays and work harder at the end of 2020. While the world was...
5 Cybersecurity Approaches All Businesses Should Consider
In Googling the “worst year in history,” you might come across the year 536. It was a year dubbed “the worst year to be...
The Wild Evolution of Ransomware
This past year, I have spent much time researching and writing about ransomware attacks as well as conducting ransomware simulation exercises. I’ve come across...
Ransomware Attacks Will Become More Prevalent in H2 2021: ISACA Survey
From the recent Colonial Pipeline attack to the D.C. Metropolitan Police Department and numerous small and medium enterprises (SME), the world has witnessed a...
10 Legal Questions You Should Be Asking About Ransomware
Data extortion through cyber means is an insidious threat that thousands of companies throughout the world experience firsthand. For many bad actors, it is...
3 Takeaways from 2020 for CISOs to Guide This Year’s Strategy
Last year cast a shockingly bright spotlight on cybersecurity with the risks that surfaced due to the rise of remote work. The year was...
Toshiba’s European Subsidiary Confirms Ransomware Attack; DarkSide’s Involvement Suspected
As the ransomware pandemic ravages through the big and small size industries alike, the Japanese tech giant joins the list of those affected by...
Ransomware Task Force Issues Framework to Combat Ransomware Attacks
Combating rising ransomware attacks has become a challenge for organizations globally. Several ransomware groups are targeting companies by encrypting their systems, paralyzing operations, and...
Supply Chain Security – A CISO Point of View
Recent news about the SolarWinds compromise and Trojan horse introduced in their software raises a question: How can organizations ensure the security of their...