AttackIQ has released a new attack graph that emulates the behaviors exhibited by BlackByte ransomware, a strain operated ...
A true lose/lose situation.
When Microsoft patched a vulnerability last summer that allowed threat actors to use Windows’ shortcut (.lnk) files in exploits, defenders might have hoped use of this tactic would decline. They were ...
New capability indexes ransomware leak-site file trees into Cerberus platform, accelerating incident response even when ...
Index Engines, the leader in cyber resilience, today shared the latest ransomware trends from its CyberSense® Research Lab, which reveals threat actors continue to advance their approaches with more ...
Indiana University Health is suing a company that was hit by a ransomware attack two years ago — an event the health system ...
Ransomware attacks turn important files into encrypted gibberish. Paying to get them back may seem like your only option, but the best ransomware protection we've tested can prevent those attacks from ...
New capability indexes ransomware leak-site file trees into Cerberus platform, accelerating incident response even when organizations aren’t the primary victim. This feature allows analysts to quickly ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results