Phishing and ransomware are increasing at the rate of several hundred percent per quarter, a trend that Osterman Research believes will continue for at least the next 18 to 24 months. However, organizations can address the threat through a variety of means: user education, security solutions, vulnerability analysis,...
The best approach to building a security policy is by using a comprehensive, layered approach that covers all threats (both new and known). This policy needs to leverage real-time threat intelligence by addressing all threat vectors and all platform types as workloads migrate from physical to virtual to...
When confronted with a scenario where backup have failed and weeks of work may be lost due to ransomware, does your organization know how to respond:
Download this infographic and learn:
What IT professionals rank as the most effective way to prevent ransomware;
How many ransomware attacks occur daily;
The top...
The drop in value of stolen payment cards caused cyber criminals to adopt new tools, foremost among them ransomware. Having already caused a financial drain of $209,000,000 in just one quarter, organizations of all sizes are at risk.
Download this infographic to see:
Why ransomware-as-a-service is a new risk;
The...
Brand and professional reputations can be damaged beyond repair by a successful ransomware or phishing attack. So how can organizations stay protected from advanced persistent cyber threats?
Download this checklist to learn how to:
Effectively secure cloud or SaaS-based applications;
Educate your users;
Detect...
When Hayward Tyler, a UK-based global manufacturing firm, suffered a Cryptolocker ransomware attack, the company had contracts still in negotiation, confidential customer data and trade secrets encrypted by cyber criminals. However, within just one hour of discovering the ransomware, they were able to identify all the...
"No More Ransom," a coalition made up of the Dutch High Tech Crime police, Europol's Cybercrime Centre, and a growing number of cyber security companies, was formed to address the rapid growth of cybercrime conducted through ransomware.
The coalition knew their website would be an irresistible target for cyber...
A recent U.S. Government interagency report indicates that, on average, there have been 4,000 daily ransomware attacks since early 2016 - a 300% increase over the 1,000 daily ransomware attacks reported in 2015.
What does this mean for small to medium-sized businesses? In order to protect your organisation, you...
The ransomware epidemic can be compared to the earlier heyday of viruses, albeit it is costing enterprises and individuals serious money. Charanjit Sodhi of Nomura Services takes a deep dive into the tactics used today and how enterprises can effectively counter them.
The first quarter of 2017 brought with it some significant changes to the threat landscape, and we aren't talking about heavy ransomware distribution either. New threats and infection techniques have forced the security community to reconsider collection and analysis efforts.
This report takes a deep look at which...
In 2016, there were two contenders for king of ransomware: Locky and Cerber. So far in 2017, we've seen a massive shift in the battle between these two families, with Locky basically dropping out entirely and Cerber expanding its market share by a significant amount. New families such as Spora are emerging as well,...
March saw the arrival of a new, so-called "Fappening/ Celebgate" scandal, where leaked images and videos of naked celebrities found their way onto the web...prime real estate for scammers who started peddling numerous links across sites like Reddit and all social networks. Likewise in February, Fortune reported a tech...
Cyberattacks are evolving at a much faster pace than the traditional security solutions can adapt to...so we must run to catch up. Machine learning and artificial intelligence (AI) assist a behavioral model of threat detection in an industry-leading alternative to traditional methods of endpoint security test suites....
Ransomware grabbed headlines in 2016, becoming the favorite attack used against businesses. However, ad fraud malware and botnets infecting Internet of Things (IoT) devices to launch massive DDoS attacks also became serious threats. So what should you expect from malware in 2017?
Download the 2017 State of Malware...
As effective as ransomware has proven to be in attacks against so many organizations across regions and sectors, certain characteristics actually can help defenders gain an edge in detecting malware. Lastline's Engin Kirda explains how.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.