Filters

Ransomware Continues to Hit Municipalities

Municipalities in California, Florida, Maine, New York, and North Carolina were victims of ransomware attacks in the month of April. The financial constraints placed on a city’s ability to spend money on cybersecurity coupled with internet-delivered city services and the data stored in a city’s systems make municipalities the perfect target for ransomware attacks. (more…)
Read More

DLL CryptoMix Exposes Ransomware Infection Method

As users become more and more aware of malspam (malware spam), or phishing emails, hackers are finding different ways to distribute ransomware. DLL CryptoMix is the latest example of ransomware variants that are distributing its ransomware through compromised remote desktop services. (more…)
Read More

Arizona Beverages Hit With Ransomware Attack

Arizona Beverages (Arizona), one of the largest beverage suppliers in the United States, was hit by a massive ransomware attack last month. The ransomware, believed to be iEncrypt, was triggered overnight on March 21. Almost three weeks after the attack, the company is still rebuilding its network. (more…)
Read More

The Ever-Changing Role of the CISO

The Chief Information Security Officer, better known as the CISO, is a relatively new C-suite position that oversees a company’s information security program. As billions were affected by cyber-attacks and data breaches in 2018, customers are beginning to expect the companies they do business with to protect their data. (more…)
Read More

Norsk Hydro Hit by LockerGoga Ransomware

Norsk Hydro, one of the largest aluminum producers in the world, has been forced to switch to partial manual operations due to a ransomware attack. The company announced Tuesday that it was the target of an extensive ransomware attack that is allegedly pushing LockerGoga. According to Norsk officials, the attack was detected on Monday evening…
Read More

Cyber Attacks Are Costing Healthcare Organizations Millions

Cyber attacks on hospitals and healthcare organizations are becoming a regular occurrence, prompting cybersecurity to become a top priority for the industry’s leaders. In 2018, the average cost of a cyber attack was $3.62 million, in addition to a damaged reputation. (more…)
Read More

Data Breaches on Financial Services Firms Increase 480 Percent

The number of data breaches reported by UK financial services firms to the Financial Conduct Authority (FCA) increased 480 percent in 2018. The retail banking sector saw the largest percentage increase in the number of data breaches; rising from only one in 2017 to 25 in 2018. (more…)
Read More

Business Email Compromise Attacks Increase Nearly 500 Percent in Q4 of 2018

Business email compromise (BEC) attacks saw a 476% increase between Q4 2017 and Q4 2018. According to Proofpoint’s Quarterly Threat Report for Q4 2018, on average, companies targeted by BEC attacks received nearly 120 fraudulent emails in the fourth quarter. This statistic is up from an average of 36 fraudulent emails in Q3 2018 and…
Read More

Dharma Crew Distributing Phobos Ransomware

A new strain of ransomware has been attacking businesses throughout the globe since the middle of December. The ransomware, dubbed Phobos, is possibly named after the Greek god of fear and shares several similarities to the most recent Dharma variants. In fact, it’s believed the creators of Dharma are behind the newly formed Phobos variant.…
Read More

Anatova Ransomware: The All-In-One Malware Tool

A new ransomware family was discovered in a private peer-to-peer network earlier this month and has prompted researchers to issue a warning due to its modular capabilities. The ransomware, nicknamed Anatova, has already been detected in several hundred machines around the world. (more…)
Read More

Data Breach Containing 773 Million Emails Leaked Online

A massive 87-gigabyte file containing 773 million unique email addresses as well as their associated cracked, or dehashed, passwords has been spotted on an online hacking forum. The file, dubbed as “Collection #1” was designed to be easily used in credential stuffing attacks. (more…)
Read More
Menu