A month after Baltimore's IT network was hit with the RobbinHood ransomware variant, officials believe the May 7 attack will cost $18 million, which includes recovering and restoring computer systems as well as lost municipal revenue.
The good news is: The development of new malware
exploits has slowed considerably. The bad news is:
That's because the old ones still continue to work so
effectively.
Download this whitepaper to learn more about:
The new malware landscape;
How ransomware has matured;
How organizations can build resilience into...
Over the past two years, the number of ransomware attacks against state and local government agencies has increased. But at the same time, these victims are paying less to attackers. A new analysis by threat intelligence firm Recorded Future asks: Why the discrepancy?
Among the top new spear-phishing threats to
enterprises: Extortion.
This whitepaper outlines the top three spear-phishing threats and new strategies to defend against them.
Download this whitepaper to learn more about:
Insights from the latest report on spear-phishing;
Why top threats are so successful;
New...
Typically, organizations see automated or manual attacks - one type or the other. But increasingly cyberattackers are striking with blended attacks, and the growth and impact of these strikes is concerning. Dan Schiappa of Sophos discusses how to improve detection and defense.
The good news is: The development of new malware exploits has slowed considerably. The bad news is: That's because the old ones still continue to work so effectively. Adam Kujawa of Malwarebytes Labs talks about the evolution of ransomware and other successful exploits.
If you're an infosec leader, you're charged with a complex mission:
effectively mitigate cybersecurity risks to your organization within the constraints of finite resources. In many cases, you strain those resources in ways that undermine your ability to continuously improve your organization's broader security...
Marcus Hutchins, the British security researcher who helped stop the massive WannaCry ransomware outbreak in mid-2017, has pleaded guilty to developing and distributing "Kronos" banking malware.
In the past, the relationship between cybersecurity and privacy has been uneasy and even ill-defined. But today, in the post-GDPR era, the relationship is clear, and so is the legal and compliance path forward, says David Ruiz of Malwarebytes.
Several dark web marketplaces are now advertising tax information. The data includes previous years' W-2 forms, form 1040 information and SSNs, among other information. This evolution in tax fraud and tax identity theft is congruent to various dark web economies, including ransomware.
Download this research report...
Browser-based cryptocurrency miners are falling out of favor as virtual currency prices remain low, IBM says. But the company says malware-based miners are coming back, including fileless ones that rely on Powershell. Here's the lowdown.
JavaScript sniffers - specialized malware that skims credit card information and other data from online shopping - are becoming far more prevalent, with several cybercriminal groups using the malware to target victims all over the world, a new analysis by security firm Group-IB finds.
Emotet is one of the most costly and destructive threats around.
Download this whitepaper and learn:
What Emotet is, how it works, and why it's so very, very dangerous;
Discover how Sophos technologies give you the best possible protection against Emotet - both individually and working together:,
Get the three...
A pair of U.S. chemical manufacturing companies have reportedly been struck by the LockerGoga ransomware over the past month and continue to recover from the same cyberattack that took down part of aluminum giant Norsk Hydro last week.
Mirai, the powerful malware that unleashed unprecedented distributed denial-of-service attacks in 2016, has never gone away. And now a new version has been equipped with fresh exploits that suggest its operators want to harness the network bandwidth offered by big businesses.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.