• May 18 2021

    The Shift from Ransomware to Data Theft Extortion

    With data theft extortion, instead of a single ransom demand, there may be hundreds or thousands. In most cases, cybercriminals are adopting a dual-revenue model where a single, large-scale ransom demand is accompanied by individual ransoms for affected parties.

  • May 10 2021

    Top 5 Ransomware Myths

    In this blog we’ll look at some of the ransomware myths and how data exfiltration prevention can facilitate compliance and mitigate risks associated with an attack.

  • February 15 2021

    Ransomware Breaches and Class Action Lawsuits

    While some organizations are waking up to the fact the ransomware attacks are in fact data breaches, unless perhaps data exfiltration technology can prove otherwise, many are still opting to sweep the attack under the carpet.

  • January 6 2021

    The State of Ransomware in 2020

  • December 4 2020

    Insider Threats: Mitigating the Risks of Data Exfiltration

    In addition to the dramatic rise in ransomware during 2020, many organizations face an even more imminent danger, the insider threat. Leading analyst firm Forrester expects insiders to be responsible for a third of breaches in 2021, up 8% from 2020, mostly due to the increase in remote working.

  • October 13 2020

    Mitigating Ransomware and Cyber Risk in the Hybrid Workforce

    If 2020 has taught IT security leaders anything, it’s that remote workers are more vulnerable to cyberattacks and ransomware, and the tools that they thought would protect them outside the walls of the corporate environment simply didn’t in many cases.

  • October 5 2020

    All Cyberattacks Lead to Data Exfiltration

    The threat of data loss, data breaches and ransomware is on the minds of everyone. We discuss the crucial part that data exfiltration plays in defending an organization from these modern threats.

  • August 4 2020

    Ransomware Reputation is Everything

    Ransomware attacks have significantly more consequences than the cost of remediation, assessment and regulatory reporting.

  • November 27 2019

    Ransomware Cyberattacks in Healthcare

    Cybercriminals are increasingly targeting healthcare organizations. As cybercriminals continue to outpace the security technology and processes in the healthcare sector, what can IT leaders do to prevent modern-day cyberattacks?

  • January 10 2019

    Protecting Online Privacy

    Most security products focus on resolving problems based on known vulnerabilities and inbound traffic whereas data and identity theft protection is concerned specifically with data loss prevention. We discuss the different types of defense mechanisms available and contrast BlackFog's approach.

  • February 20 2018

    Fileless PowerShell Attacks

    Fileless PowerShell attacks are now the preferred weapon of choice for cyberattacks because they provide a number of techniques around existing security. Not least of all, the ability to run directly in memory and remotely download payloads.

  • October 16 2017

    BlackFog Enterprise released with Dark Web protection

    Unlike antivirus software which uses signature based techniques, BlackFog Enterprise uses next generation multivariant behavioral analysis to prevent attacks and reduce the total surface area exposed to cyber criminals. This includes blocks based on geography, DNS and network anomalies.