Response to CISA Advisory (AA24-060A): #StopRansomware: Phobos Ransomware

AttackIQ has released a new assessment template in response to the recently published CISA Advisory (AA24-060A) which disseminates known Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IOCs) associated with the ...

GootLoader: Unloaded

GootLoader, a stealthy JavaScript-based downloader, has posed a persistent threat to Windows-based systems since 2020. In this article, we'll delve into who Gootloader is and how organizations can effectively emulate and test ...
The Threat of Clop Ransomware: How to Stay Safe and Secure

The Threat of Clop Ransomware: How to Stay Safe and Secure

Protect your organization from the re-emerging threat of Clop ransomware. Learn what Clop is, how it works, and how to prevent a potential ransomware attack. The post The Threat of Clop Ransomware: ...
🥇

Cyber Security DE:CODED – Security opportunities for Managed Service Providers

“Every SMB is an expert in something. A passion. It’s probably not anti-virus…” Show notes for series 2, episode 7 Small business and Managed Service Provider special! In June 2022*, we set ...
Conti Ransomware: The History Behind One of the World’s Most Aggressive RaaS Groups

Conti Ransomware: The History Behind One of the World’s Most Aggressive RaaS Groups

Conti ransomware has become one of the most infamous in the ransomware space. Recent developments have called into question the future of the group, prompting a look back on how they came ...
The History and Evolution of Ransomware Attacks

The History and Evolution of Ransomware Attacks

It’s imperative for all organizations to have a plan for how to prevent and respond to ransomware attacks. But in order to understand how to prepare today, it’s also necessary to understand ...
The History and Evolution of Ransomware Attacks

The History and Evolution of Ransomware Attacks

It’s imperative for all organizations to have a plan for how to prevent and respond to ransomware attacks. But in order to understand how to prepare today, it’s also necessary to understand ...
Ransomware as a Service

Ransomware as a Service – The Trending Business Model for Attacks

Ransomware as a Service (RaaS) is the new and trending business model for ransomware attacks. It’s a decentralized and mostly automated mode of distribution to support the fast-growing demands of ransomware operators ...
RaaS

Ransomware as a Service: A Thriving Business for Hackers

Ransomware as a service has become quite a popular and profitable business for cybercriminals. These cybercriminals often collaborate with malware developers and carry out coordinated cyberattacks. This approach to a ransomware attack ...
Ransomware by the Numbers – An Impact Overview

Ransomware by the Numbers – An Impact Overview

The number of global ransomware attacks is on the rise. According to Threatpost, the global volume of ransomware operations reached 304.7 million attacks in H1 2021. That’s a year-over-year increase of 151% ...

Secure Guardrails