Mar 12, 2019 8:30:00 AM

Attack Surface Ep. 5: What's Up with Ransomware and Cryptomining?

I was recently intrigued by the increased number of reported ransomware attacks on local governments. Since the start of the new year, cities such as Akron, Ohio and Sammamish, Washington have been temporarily crippled by ransomware. Often, attacks on “big fish” make the headlines… but what about the “little fish”? Why are we seeing an uptick in attacks on smaller entities? What kind of threat does ransomware pose to small businesses and local governments? For answers, I turned to my colleague and cybersecurity expert, Dr. Wesley McGrew, and asked, “What’s up with ransomware?”. This led to an interesting discussion around the evolving attack methods used by threat actors, specifically ransomware and cryptomining, and why smaller entities are their prime target.

Topics: ransomware, Attack Surface, Podcast

Jan 3, 2019 9:30:00 AM

Our 5 Most Read Blogs of 2018

As we transition into the new year, we look back at 2018… from previewing DEF CON and Black Hat USA talks to cryptocurrency mining and blockchain, our readers, clients, friends, and teammates gave us a space to discuss the latest in cybersecurity. For this, we thank you!

Topics: ransomware, black hat USA, SOC for Cybersecurity, Executive Insights, DEF CON

Apr 18, 2018 9:30:00 AM

Coping with Ransomware Fatigue

Ransomware attacks have increased in number and financial impact significantly. According to the FBI, the cost of ransomware attacks in the past few years has reached into billions of dollars, with the total impact doubling each year. Ransomware attacks can be the result of widespread malicious software, like the high-profile "WannaCry" attacks, or the end-goal of very targeted attacks launched against your organization by threat actors that have compromised your servers or users' workstations.

Topics: ransomware

Mar 13, 2018 9:09:30 AM

High Expectations for Service, With Reverse Engineering

A cornerstone of a cybersecurity firm is in their “reverse engineering” capability. It is a necessary part of responding to breaches, keeping up with the state-of-the-art in threats, and enhances the coverage of penetration testing and red-team engagements. While it separates leaders from followers in the industry, very few business stakeholders have had the opportunity to learn what “reverse engineering” means, how it can be a measure of a security service provider’s capability, and how such services can directly benefit an organization.

Topics: digital forensics, Penetration Testing, data security, cybersecurity, information security, ransomware, advanced penetration testing, incident response, Malware, Executive Insights

May 10, 2016 10:00:00 AM

Buying Your Own Stolen Data

I’m becoming very used to reading about the latest “ransomware” attacks each morning when I catch up on information security news over my first cup of coffee. Malicious software (malware) authors seem to have found a successful way of making money, and unsafe, yet common, practices are enabling it. Office-wide sharing of data with security as an afterthought, and the absence of strong backup and recovery processes fuel the continued rise of ransomware. Trends point to an increase in healthcare data being held for ransom, though no one is completely safe from being targeted by ransomware.

Topics: ransomware