The Week in Ransomware – August 19th 2022 – Evolving extortion tactics
Bringing you the latest ransomware news, including new research, tactics, and cyberattacks. We also saw the return of the BlackByte…
Bringing you the latest ransomware news, including new research, tactics, and cyberattacks. We also saw the return of the BlackByte…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added seven vulnerabilities to its list of bugs actively exploited by…
By Debanjali Ghosh, Technical Evangelist, ManageEngine The concept of a network being fully enclosed within a building, and […] The…
Preventing internal & external cybersecurity breaches with zero trust OT network segmentation By Ryan Lung, Senior product manager […] The…
Attacked once, victimized multiple times: Data marketplaces are making it easier for threat actors to find and use data exfiltrated…
In her keynote address at Black Hat USA 2022, Kim Zetter gives a scathing rebuke of Colonial Pipeline for not…
The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) warned US organizations today that attackers…
The new open source tools are designed to help defense, identity and access management, and security operations center teams discover…
An automotive supplier had its systems breached and files encrypted by three different ransomware gangs over a two-week span in May,…
A member of the Cuba ransomware operation is employing previously unseen tactics, techniques, and procedures (TTPs), including a novel RAT…