ransomware Blog Terms - Page 2 of 12 - Attivo Networks

ransomware

Leveraging MITRE Shield to Defend Against Ransomware

Written by: Joseph R. Salazar, CISSP, CEH, EnCE – Ransomware attacks have evolved and grown in number.  Traditional ransomware sought to spread and encrypt as many endpoints as possible, but Ransomware 2.0 attacks employ advanced methods or have a human controller directing their activities. These attacks spend much more time conducting discovery to identify business-critical assets for encryption. Because these assets are essential for business continuity and daily operations, the organization is more likely to pay to recover them instead of spending the money on endpoint systems they could re-image and recover.  Attackers encrypting the entire Active Directory server infrastructure can demand much higher ransoms, and the organization must pay or else lose money, time, and resource attempting to restore operations. Additionally, these attackers often exfiltrate data and threaten to release it to induce ransom payment, often demanding a second ransom to prevent the release of the information.

The Washington Post Logo

The Cybersecurity 202: Cyber experts give Biden top marks at six months

At his six-month mark in office, President Biden is making the right moves to ensure the United States is safer in cyberspace, according to an overwhelming majority of cybersecurity experts we polled.  Biden’s term has been marked by a string of cyber cataclysms starting with cleaning up the SolarWinds Russian espionage campaign, which was discovered …

The Cybersecurity 202: Cyber experts give Biden top marks at six months Read More »

Virtual Cybersecurity Summit

Vendor Partner Round-Up: REvil Reviled, Kaseya Attack Broken Down

It’s been quite a week when it comes to ransomware. The Kaseya attack has permeated the cybersecurity headlines across the pages of the Data Connectors Community Partners. The REvil ransomware group has gained a reputation for big cash sums and sweeping attacks – but where do they come from, and what are they looking to …

Vendor Partner Round-Up: REvil Reviled, Kaseya Attack Broken Down Read More »

Kaseya VSA Supply Chain Ransomware Attack

Written by: Joseph Salazar, Technical Marketing Engineer – A significant reminder of the SolarWinds attack, attackers have once again targeted a trusted software vendor, this time Kaseya, to compromise hundreds of businesses and deploy ransomware. There are reports that the REvil ransomware group was behind this attack and that they have demanded $70 million to unlock the compromised systems. It is known to have affected over 1500 businesses using their on-premises software version. Many of these businesses use Managed Service Providers that the ransomware affected.

Cybersecurity software tool uses trickery to ward off potential threats from hackers

Researchers at the Pacific Northwest National Laboratory have come up with a cybersecurity software tool that builds on the old notion of honeypots, a way of tricking hackers into thinking they’ve gotten into your systems. The new technology is called Shadow Figment. Thomas Edgar, the labs senior cybersecurity scientist, joined Federal Drive with Tom Temin to talk about how it …

Cybersecurity software tool uses trickery to ward off potential threats from hackers Read More »

News 12

The New Normal: Exploding epidemic of ransomware attacks

News 12‘s Elizabeth Hashagen was joined by Tony Cole, CTO Attivo Networks, and Sean Joyce to talk about the exploding epidemic of ransomware attacks. Tomorrow, President Joe Biden is meeting with Russian President Vladimir Putin. Biden is expected to raise concerns over a series of ransomware attacks and other cybersecurity concerns with Putin. Ransomware attacks …

The New Normal: Exploding epidemic of ransomware attacks Read More »

ZDNet Logo

Fujifilm becomes latest ransomware victim as White House urges business leaders to take action

Tony Cole, CTO of Attivo Networks and a former executive at FireEye, McAfee, and Symantec, told ZDNet that there were a variety of reasons behind the recent spate of ransomware attacks. Enterprises have an over-reliance on vendors and in general, organizations continue to add digital tools to their operations which increases the complexity of work for cybersecurity officials.

Gula Tech logo

Gula Tech Adventures – Episode 23 – Tony Cole – Cyberdeception

Ron and Cyndi Gula interview Tony Cole, CTO at Attivo Networks, and speak about the use of cyber deception to thwart and frustrate hackers. We also speak about the cyber industry, Tony’s career in cybersecurity and some great works of science fiction influencing the industry. Transcript: Tony Cole: [00:19:30] Th-that’s a great point you’re making …

Gula Tech Adventures – Episode 23 – Tony Cole – Cyberdeception Read More »

SDxCentral logo

Cybersecurity Execs Weigh In On Biden Executive Order

U.S. President Biden late Wednesday signed a long-awaited executive order intended to improve the country’s cybersecurity and protect federal networks. The move follows some of the worst attacks against U.S. networks and critical infrastructure including SolarWinds, the Microsoft Exchange hack, and, most recently, the ransomware attack against Colonial Pipeline that took down the country’s largest fuel line. Biden’s directive requires …

Cybersecurity Execs Weigh In On Biden Executive Order Read More »

Scroll to Top