Ransomware Archives - Attivo Networks
Five Ways to Protect Yourself and Your Business from a Ransomware Attack

Five Ways to Protect Yourself (and Your Business) from a Ransomware Attack

Reading Time: 4 minutes
Authored by: Tony Cole, CTO, Attivo Networks - I recently spoke with Authority Magazine on the topic of ransomware, and one of the questions they asked me about was how today’s organizations can best prepare for and defend against ransomware attacks. It’s a topic that ...
Read More
Securing Remote Services from Ransomware Attacks

Securing Remote Services from Ransomware Attacks

Reading Time: 3 minutes
Written by: Vikram Navali, Senior Technical Product Manager - Threat actors often target remote services to gain unauthorized access to internal systems and launch ransomware attacks. Once inside the victim's network, their goal is to exploit remote services, move laterally and gain access to remote systems ...
Read More
Ransomware Survey Says… Active Directory is Under Attack and Needs Attention

Ransomware Survey Says… Active Directory is Under Attack and Needs Attention

Reading Time: 4 minutes
Authored by: Carolyn Crandall, Chief Security Advocate - CyberRisk Alliance (CRA) published a new report titled “State of Ransomware: Invest now or pay later.” The report highlighted new findings from a January 2022 research study on the continuing escalation of ransomware attacks and what organizations ...
Read More
Defenders Must Pay Attention to the Conti Ransomware Operations

Defenders Must Pay Attention to the Conti Ransomware Operations

Reading Time: 3 minutes
Written by: Vikram Navali, Senior Technical Product Manager - Cyberattacks are playing a critical role in the Russia-Ukraine conflict. With the recent incidents of HermeticWiper malware and a series of distributed denial-of-service (DDoS) attacks, it appears groups from both Russia and Ukraine are targeting their ...
Read More
HermeticWiper: A New Data Wiper Malware Targeting Ukraine Systems

HermeticWiper: A New Data Wiper Malware Targeting Ukraine Systems

Reading Time: 2 minutes
Written by: Vikram Navali - Senior Technical Product Manager, As the Ukraine-Russia conflict is gathering attention from everyone worldwide, a massive data-wiping malware called HermeticWiper hit multiple organizations in Ukraine. According to ESET researchers, threat actors have been in preparation for a couple of months ...
Read More
What is BlackCat and How to Stop It.

What is BlackCat and How to Stop It.

Reading Time: 4 minutes
Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks - In November 2021, security professionals first observed a new strain of ransomware known as BlackCat (or ALPHV), targeting organizations across multiple industries worldwide. The group running BlackCat operates within the “ransomware-as-a-service” (RaaS) business model like ...
Read More
Safeguard Data Using Ransomware Behavioral Protection

Safeguard Data Using Ransomware Behavioral Protection

Reading Time: 3 minutes
Written By: Virkram Navali, Senior Technical Product Manager - Ransomware attacks keep showing up in daily cyber-threat bulletins. The State of Ransomware report from BlackFog shows a 17% increase in ransomware attacks in 2021 compared to 2020. The BlackFog's reports also forecast a rise in ransomware attacks, ...
Read More
Buried in Every Breach Report

What’s Buried in Every Breach Report That No One is Talking About

Reading Time: 3 minutes
Written by: Carolyn Crandall, Chief Security Advocate - Chris Krebs, former director of the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and co-founder of Krebs Stamos Group, is a prolific speaker and we had the pleasure of having him join Tony Cole, Attivo Networks CTO ...
Read More
Preventing Credential Theft

Preventing Credential Theft by RedLine Stealer Malware

Reading Time: 2 minutes
Authored by: Gorgang Joshi and Chandan S - A credential-based attack occurs when an attacker steals credentials, extends privileges, and compromises critical data. Credential theft is the first stage of a lateral movement attack and stopping the attack early in the process can make a ...
Read More
Attivo Networks Detects Attack

Attivo Networks Detects Attack at Major Petrochemical Company

Reading Time: 3 minutes
Cyber risk to industrial sectors has grown and accelerated dramatically, led by ransomware impacting industrial processes and new activity from adversaries targeting Industrial Control Systems (ICS).  According to a Dragos ICS Cybersecurity 2020 report, most of its services clients had no visibility into their ICS ...
Read More

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise
Scroll to Top