Providing you the latest industry-specific news and insights.
Dear Ramey: Tips to Improve the Security of Data Sharing
ANSWERING BURNING QUESTIONS FROM VICTIMS OF CYBER EVENTS. DEAR RAMEY: The more I read in the news about cyberattacks, the more I worry about all the information that could wind up in the wrong hands. Social media sites, law firms, and…Read more
Dear Ramey: What Can We Do to Minimize the Target on Our Back?
ANSWERING BURNING QUESTIONS FROM VICTIMS OF CYBER EVENTS. DEAR RAMEY: We haven’t experienced a breach or unauthorized access — at least not that we know of — but recent news headlines have my company concerned and wondering how we can minimize our…Read more
Endpoint Detection and Response: The Closest Thing to a Silver Bullet to Stop Ransomware
By Paul Caron In its recent report “Combating Ransomware,” the Ransomware Task Force says there’s no silver bullet to solving the ransomware challenge. Instead, the group touts a multi-pronged approach and provides an extensive list of…Read more
Teach a Man Not to Be Phished
BY KEVIN BAKER Email phishing scams are rampant. And to help you avoid falling victim to one, I’m offering five easy to-dos. 1. STAY ALERT. When it comes to defeating cybercrime, awareness is step number one. While deceptive emails aren’t the…Read more
Dear Ramey: Could I Lose My Job Over This Cyberattack?
ANSWERING BURNING QUESTIONS FROM VICTIMS OF CYBER EVENTS DEAR RAMEY: My organization recently recovered from a devastating cyberattack. We lost access to our information for a few days. Root cause analysis determined that the threat actor…Read more
Avaddon Ransomware Hits AXA
BY ARETE CYBER THREAT INTELLIGENCE TEAM EXECUTIVE SUMMARY From September 2020 to May 2021, the Arete Incident Response (IR) practice responded to nine Avaddon ransomware engagements across varying industry sectors, including the professional…Read more
Empowering Cybersecurity Career Advancement in India
BY RAJ SIVARAJU, PRESIDENT OF APAC Companies around the world have long relied on India for cost-effective technical outsourcing. Thanks to the country’s abundance of highly trained technical talent, it’s been a successful support model. But like…Read more
Colonial Pipeline Breached by Darkside Ransomware Group
On Saturday May 8, US Colonial Pipeline announced that they were victim of a ransomware attack that affected their network on Friday May 7. US Colonial Pipeline is said to be the largest fuel pipeline in the United States and the main source of…Read more
Technical Insight: The 10 Stages of a Highly Sophisticated LuckyDay Ransomware Attack
BY ELEC MCCLELLAN, SECURITY OPERATIONS CENTER LEAD Sophisticated threat actors may or may not know the difference between a salad knife and a dinner knife, but they’d be happy to hold either to your throat when the time is right — and they sure…Read more
Dear Ramey: Bad Guys Deleted Our Data. How Do We Get It Back?
ANSWERING BURNING QUESTIONS FROM VICTIMS OF CYBER EVENTS DEAR RAMEY: My organization was hacked. The bad guy found our data and deleted it — including our backups! All they left was a note stating, “Send a message to this email address to get your…Read more
The Hidden Costs of Cybercrime
By Kevin Baker, Director of Cyber Strategy and Defense This year, the global cost of cybercrime is expected to hit $6 trillion.[i] Up from $3 trillion in 2015, it’s nothing short of a big, flourishing business whose operators are relentless…Read more
Codecov Bash Uploader Supply Chain Attack
By Arete Cyber Threat Intelligence Team EXECUTIVE SUMMARY On April 15, Codecov announced a compromise to its Bash Uploader (a software application used in some of its products), whereby a threat actor was able to send sensitive information from…Read more