Is it ever acceptable for ransomware victims to pay a ransom to obtain the decryption key required to restore access to their data? Due to poor preparation, many organizations continue to face that question.
Backed by its own logo, Badlock refers to a set of critical Samba vulnerabilities in Windows and most Unix/Linux operating systems, which attackers could exploit to launch man-in-the-middle attacks against corporate networks.
Ransomware is on the rise. As businesses brace for attack, we can't help but wonder: what would you do if your company were hit with ransomware? Unfortunately, if you haven't backed up your files, there's nothing much you can do-unless you pay the ransom. Of course, that puts a target on your back for future malware...
Advanced attackers always use advanced malware, right? Zero-day exploits, targeted malware, powerful modular frameworks- these are the stock and trade of your adversary.
So we've tuned our detection and hunting capability to ferret out the indicators left behind by this malware. Advances in memory forensics,...
Security experts are once again warning all Flash users to either update or uninstall the browser plug-in software to protect themselves against active exploit kit attacks that are targeting a zero-day Flash flaw to install ransomware.
As the threat of malware infections, especially those involving ransomware, grows, organizations need to balance their perimeter-based security practices with an "intrusion tolerance" strategy that helps ensure a quick recovery, says medical device cybersecurity expert Kevin Fu.
What steps can organizations take to help ensure they're not the next victim of a ransomware attack? Technology expert Craig Musgrave of The Doctors Company, which offers cyber insurance, identifies the top priorities.
As Medstar Health completes its recovery from a recent malware attack that led to a temporary shutdown of most of its systems, other U.S. hospitals continue to struggle with similar attacks, many of them involving ransomware. What risk mitigation steps are most essential?
This report from IBM Emergency Response Services discusses four key trends in cybersecurity based on field experience in responding to client security incidents.
In the following whitepaper, you will learn about:
Onion-layered security incidents on the rise
The year of ransomware
Malicious insiders on the...
Revelation of 321 attempts to place ransomware on federal government computers in the second half of last year raises a number of questions about the effectiveness of the Einstein intrusion detection and prevention system as well as how the government responds to such attacks.
Federal regulators have issued new guidance urging healthcare organizations and business associates to bolster their cyberattack defenses. The advice comes after a string of recent high-profile attacks on hospitals.
MedStar is but the latest healthcare entity to fall victim to a ransomware attack. What can organizations do proactively to improve their ransomware defenses and response? PhishMe CEO Rohyt Belani offers insight.
Despite all the funds you may have spent on state-of-the-art security software, the bad guys are just one gullible user click away from staging an all-out invasion. Find out what the true best practices are for security awareness training - those that establish a human firewall to effectively block hackers and...
Ransomware is such a serious cybersecurity concern that the FBI has issued new guidance and yet another alert about the threat. Nevertheless, experts say too many organizations are still unaware of the risk, muchless how to mitigate it.
Although organizations in a number of business sectors, including healthcare, have been targeted by ransomware attacks in recent months, a new report reveals that government agencies also were targeted hundreds of times during the second half of last year, but no ransoms were paid.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.