May 18 2021
The Shift from Ransomware to Data Theft Extortion
With data theft extortion, instead of a single ransom demand, there may be hundreds or thousands. In most cases, cybercriminals are adopting a dual-revenue model where a single, large-scale ransom demand is accompanied by individual ransoms for affected parties.
May 10 2021
Top 5 Ransomware Myths
In this blog we’ll look at some of the ransomware myths and how data exfiltration prevention can facilitate compliance and mitigate risks associated with an attack.
February 15 2021
Ransomware Breaches and Class Action Lawsuits
While some organizations are waking up to the fact the ransomware attacks are in fact data breaches, unless perhaps data exfiltration technology can prove otherwise, many are still opting to sweep the attack under the carpet.
December 4 2020
Insider Threats: Mitigating the Risks of Data Exfiltration
In addition to the dramatic rise in ransomware during 2020, many organizations face an even more imminent danger, the insider threat. Leading analyst firm Forrester expects insiders to be responsible for a third of breaches in 2021, up 8% from 2020, mostly due to the increase in remote working.
October 13 2020
Mitigating Ransomware and Cyber Risk in the Hybrid Workforce
If 2020 has taught IT security leaders anything, it’s that remote workers are more vulnerable to cyberattacks and ransomware, and the tools that they thought would protect them outside the walls of the corporate environment simply didn’t in many cases.
October 5 2020
All Cyberattacks Lead to Data Exfiltration
The threat of data loss, data breaches and ransomware is on the minds of everyone. We discuss the crucial part that data exfiltration plays in defending an organization from these modern threats.
August 4 2020
Ransomware Reputation is Everything
Ransomware attacks have significantly more consequences than the cost of remediation, assessment and regulatory reporting.
November 27 2019
Ransomware Cyberattacks in Healthcare
Cybercriminals are increasingly targeting healthcare organizations. As cybercriminals continue to outpace the security technology and processes in the healthcare sector, what can IT leaders do to prevent modern-day cyberattacks?
January 10 2019
Protecting Online Privacy
Most security products focus on resolving problems based on known vulnerabilities and inbound traffic whereas data and identity theft protection is concerned specifically with data loss prevention. We discuss the different types of defense mechanisms available and contrast BlackFog's approach.
February 20 2018
Fileless PowerShell Attacks
Fileless PowerShell attacks are now the preferred weapon of choice for cyberattacks because they provide a number of techniques around existing security. Not least of all, the ability to run directly in memory and remotely download payloads.
October 16 2017
BlackFog Enterprise released with Dark Web protection
Unlike antivirus software which uses signature based techniques, BlackFog Enterprise uses next generation multivariant behavioral analysis to prevent attacks and reduce the total surface area exposed to cyber criminals. This includes blocks based on geography, DNS and network anomalies.