Ransomware Decoded: Preventing Modern Ransomware Attacks

Ransomware Decoded: Preventing Modern Ransomware Attacks

Many types of malware silently persist on the network, move laterally, communicate with their C2, or obfuscate their behaviors to prevent detection. In contrast to this, traditional ransomware was all about coming ...
Rise of Double-Extortion Shines Spotlight on Ransomware Prevention

Rise of Double-Extortion Shines Spotlight on Ransomware Prevention

Double extortion is a tactic employed by some ransomware gangs. It begins when a crypto-malware strain steals information stored on a victim’s machine before launching its encryption routine ...
The Cybereason Difference: Introduction to the Malop

The Cybereason Difference: Introduction to the Malop

Welcome to the April edition of our series The Cybereason Difference (inaugural post here). Each post of this series explores a unique way that Cybereason empowers defenders ...

Ransomware Defense: Three Implementations Every Security Team Needs

Few will be shocked to hear that ransomware attacks are continuing to accelerate at a torrid pace - but the more concerning trend is the effectiveness of ransomware at creating chaos and ...

FBI Pegs 2020 Cybercrime Costs at $4 Billion – Actual Losses Likely Higher

Cybercrime cost the American public over $4 billion in reported losses over the course of 2020, according to the FBI. In its Internet Crime Report 2020, the FBI’s Internet Crime Complaint Center ...

DearCry Ransomware and the HAFNIUM Attacks – What You Need to Know

The widespread HAFNIUM attacks were just the beginning of the problems stemming from multiple vulnerabilities in Microsoft’s Exchange offering that were recently disclosed. According to Bleeping Computer, users began submitting new ransomware ...

Why Healthcare Security Requires an Operation-Centric Approach

The healthcare industry is getting much more attention than normal right now. COVID-19 has disrupted business operations and turned lives upside down around the world as everyone struggles to get the pandemic ...

Sodinokibi/REvil Ransomware Gang Hit Acer with $50M Ransom Demand

The Sodinokibi/REvil ransomware gang has reportedly infected Taiwanese multinational electronics corporation Acer and demanded a ransom of $50 million. Those responsible for the Sodinokibi ransomware strain announced on their data leaks website ...

SolarWinds Attacks Recovery Effort Could Take U.S. Government 18 Months

The U.S. government could take up to 18 months in its efforts to recover from the SolarWinds supply chain attack, explained the U.S. Cybersecurity & Infrastructure Security Agency (CISA) ...

The Security Value of Exploit Protection

An exploit attack occurs when a malicious actor takes advantage of a software vulnerability to penetrate and then damage or steal information from a computer system. One feature that Cybereason provides to ...