Ransomware and Cybersecurity Blog
Data Security Services: What do Firms Need to Know?
Why should firms be considering data security services as part of their cyber protection strategy?
MDR vs EDR: What Differences Must Firms be Aware of?
What are the key differences between MDR and EDR tools businesses must be aware of when looking for managed security solutions?
LockBit Ransomware Affiliates Leverage Citrix Bleed Vulnerability (CVE-2023-4966)
Citrix Bleed is being leveraged by LockBit ransomware affiliates to compromise organizations using CVE-2023-4966.
What is Ransomware? Things You Need to Know About Ransomware
Everything you need to know about ransomware: what is ransomware, different types of ransomware, how does it spread, impact, and how to protect against it.
What you Need to Know About Data Security Posture Management
What should firms be aware of when considering a data security posture management solution?
Impact of Badbox and Peachpit Malware on Android Devices
Explores the Badbox and Peachpit malware on Android devices and home networks which granted illegitimate users backdoor access.
How Data Exfiltration is Changing the Ransomware Landscape
An exponential rise in data exfiltration is changing the ransomware landscape afflicting over 91% of all attacks.
2023 Ransomware Attack Report
The 2023 ransomware attack report summarizes the major changes we saw in ransomware trends and tactics by geography, sector and variant.
Dual Ransomware Attacks: A Quicker Route to Extortion
Dual ransomware attacks are the latest trend by threat actors whereby they send a secondary strain after the initial compromise has been successful.