Cybersecurity

Companies and Cybersecurity Services News

Cyber criminals are getting smarter and strive to find new ways to sneak into a company’s information systems. Cyber security companies are turning to innovative solutions to combat those threats, in order to minimize cybercrimes.


Attack, Computer security, Attack!, Cyber security standards, Victim, Identity theft

@GlasswingVC shared
On Jun 7, 2022
RT @BlackKiteTech: Clop ransomware gang - back again? Black Kite Research analyzed 20 of their 21 latest victims after a hiatus since late 2021. Discover which vulnerabilities present within their cyber ecosystems allowed Clop to gain initial access. ▶️ https://t.co/JRlXRNZDWh
Open

CLOP Ransomware Gang Reemerges to Claim 21 New Victims

Black Kite analyzes the ransomware indicators of 20 of the newest Clop ransomware gang victims and how it relates to their cyber posture moving forward.

@GlasswingVC shared
On Jun 7, 2022
RT @BlackKiteTech: Clop ransomware gang - back again? Black Kite Research analyzed 20 of their 21 latest victims after a hiatus since late 2021. Discover which vulnerabilities present within their cyber ecosystems allowed Clop to gain initial access. ▶️ https://t.co/JRlXRNZDWh
Open
CLOP Ransomware Gang Reemerges to Claim 21 New Victims

CLOP Ransomware Gang Reemerges to Claim 21 New Victims

Black Kite analyzes the ransomware indicators of 20 of the newest Clop ransomware gang victims and how it relates to their cyber posture moving forward.

The Top 10 Ways Ransomware Operators Ramp Up the Pressure to Pay

The Top 10 Ways Ransomware Operators Ramp Up the Pressure to Pay

Ransomware operators don’t just target systems and data, they target people in their ever-increasing efforts to get the victim to pay

Double extortion ransomware attacks and how to stop them

Double extortion ransomware attacks and how to stop them

As ransomware attacks increase, hackers are diversifying their tactics to get victims to hand over larger sums of money. We investigate the rise of double extortion attacks.

The perfect storm driving the growth of ransomware

The perfect storm driving the growth of ransomware

Market conditions, coupled with a major security leak from the National Security Agency (NSA) that took place in 2017, formed the perfect storm for ransomware. Money’s motivation According ...

Third-party ransomware risk is real, but Black Kite’s latest tool can help

Third-party ransomware risk is real, but Black Kite’s latest tool can help

Black Kite's Ransomware Susceptibility Index calculates the probability of a third-party provider being hit by ransomware within 12 months.

Months after the Accellion breach, more victims emerge

Months after the Accellion breach, more victims emerge

Guidehouse, a victim of the Accellion breach, was still notifying clients this summer that may have been impacted through the third-party service.

Story of the year 2019: Cities under ransomware siege

Story of the year 2019: Cities under ransomware siege

Based on publicly available statistics and announcements monitored by Kaspersky experts, 2019 has seen at least 174 municipal organizations targeted by ransomware.

Ransomware Profile: ALPHV

Ransomware Profile: ALPHV

A comprehensive profile of the ALPHV (BlackCat) ransomware strain.

5 Global Cyberthreats—And How To Fight Them

5 Global Cyberthreats—And How To Fight Them

Today’s cybercriminals can work across borders through many new points of attack, and they’re armed with sophisticated tools to increase their reach and effectiveness.

How Do Initial Access Brokers Enable Ransomware Attacks?

How Do Initial Access Brokers Enable Ransomware Attacks?

Microsoft Remote Desktop Protocol (RDP) vulnerabilities accounted for over half of all ransomware attacks, where Initial Access Brokers scan for exposed RDP ports and then sell network ...

Ransomware Evolves, Security Tries to Keep Pace

Ransomware Evolves, Security Tries to Keep Pace

A closer look at how this threat continues to grow, and how it impacted one of its latest victims: Jack Daniel's.

Iranian Hackers Launch Dharma Ransomware Attack on Global Firms

Iranian Hackers Launch Dharma Ransomware Attack on Global Firms

Security analysts and researchers from around the globe have made recent discoveries regarding an Iran-linked rookie hacker group, carrying outContinue reading The post Iranian Hackers ...

Reporter's Guide to Investigating Organized Crime

Reporter's Guide to Investigating Organized Crime

As part of GIJN's new reporting guide for organized crime, this chapter covers investigating cybercrime and the "dark web."

How financial institutions can make ransomware a less lucrative business

How financial institutions can make ransomware a less lucrative business

Through constant joint information sharing and pre-emptive defense groupthink, this vulnerable industry can unite to diffuse data-theft fallout. 1

Ransomware Today: A Diversified Business Model

Ransomware Today: A Diversified Business Model

Ransomware is not a new cyber attack strategy, but it is a growing concern to the financial sector.

Tech Experts Talk Cyber-Disaster Preparedness – During Cybersecurity Awareness Month

Tech Experts Talk Cyber-Disaster Preparedness – During Cybersecurity Awareness Month

Cybersecurity Awareness Month has kicked off during the month of October for the 18th year. During this timely month, we are faced with the reality that cyberattacks still continue to rise ...

Hackers Exploit Accellion Zero-Days in Recent Data Theft and Extortion Attacks

Hackers Exploit Accellion Zero-Days in Recent Data Theft and Extortion Attacks

Hackers Exploit Accellion Zero-Days in the Recent Data Theft and Extortion Attacks

New Jersey hospital paid ransomware gang $670K to prevent data leak

New Jersey hospital paid ransomware gang $670K to prevent data leak

University Hospital New Jersey in Newark, New Jersey, paid a $670,000 ransomware demand this month to prevent the publishing of 240 GB of stolen data, including patient info.

Here’s What Universities Need to Know About Cyber-Attacks

Here’s What Universities Need to Know About Cyber-Attacks

A recent spate of ransomware attacks, suggests that cyber-criminals are taking advantage of the weaknesses of the new hybrid learning model at Universities.

Cybersecurity Threats and Attacks

Cybersecurity Threats and Attacks

Cybersecurity Threats are increasing and becoming more advanced every day. Individuals and businesses are constantly under attack and must...