Human-operated ransomware attacks: A preventable disaster

Credit to Author: Eric Avena| Date: Thu, 05 Mar 2020 17:00:31 +0000

In human-operated ransomware attacks, adversaries exhibit extensive knowledge of systems administration and common network security misconfigurations, perform thorough reconnaissance, and adapt to what they discover in a compromised network.

The post Human-operated ransomware attacks: A preventable disaster appeared first on Microsoft Security.

Read more

Malwarebytes Labs releases 2020 State of Malware Report

Credit to Author: Malwarebytes Labs| Date: Tue, 11 Feb 2020 08:01:00 +0000

The 2020 State of Malware Report reveals how cybercriminals upped the ante on businesses, Mac threats outpaced PCs, and ransomware continued its targeted, deadly assault with new families in 2019. Learn all this and more in the full report, linked in our blog.

Categories:

Tags:

(Read more…)

The post Malwarebytes Labs releases 2020 State of Malware Report appeared first on Malwarebytes Labs.

Read more

Tampa Bay Times hit with Ryuk ransomware attack

Credit to Author: David Ruiz| Date: Fri, 24 Jan 2020 20:11:10 +0000

Florida newspaper The Tampa Bay Times suffered a Ryuk ransomware attack Thursday, making it the latest major victim of the notorious ransomware family that continues to rise in popularity.

Categories:

Tags:

(Read more…)

The post Tampa Bay Times hit with Ryuk ransomware attack appeared first on Malwarebytes Labs.

Read more

The Hidden Cost of Ransomware: Wholesale Password Theft

Credit to Author: BrianKrebs| Date: Mon, 06 Jan 2020 18:17:21 +0000

Organizations in the throes of cleaning up after a ransomware outbreak typically will change passwords for all user accounts that have access to any email systems, servers and desktop workstations within their network. But all too often, ransomware victims fail to grasp that the crooks behind these attacks can and frequently do siphon every single password stored on each infected endpoint. The result of this oversight may offer attackers a way back into the affected organization, access to financial and healthcare accounts, or — worse yet — key tools for attacking the victim’s various business partners and clients.

Read more

A decade in cybersecurity fails: the top breaches, threats, and ‘whoopsies’ of the 2010s

Credit to Author: Malwarebytes Labs| Date: Thu, 19 Dec 2019 18:03:33 +0000

As the 2010s come to a close, we take a snarky walk down memory lane, listing the craziest, most impactful, or simply just awful cybersecurity fails of the decade.

Categories:

Tags:

(Read more…)

The post A decade in cybersecurity fails: the top breaches, threats, and ‘whoopsies’ of the 2010s appeared first on Malwarebytes Labs.

Read more

A week in security (December 9 – 15)

Credit to Author: Malwarebytes Labs| Date: Mon, 16 Dec 2019 17:08:30 +0000

A roundup of cybersecurity news from December 9 – 15, including smart doorbell concerns, a new credit card skimmer vulnerability, and a deep dive into Ryuk ransomware.

Categories:

Tags:

(Read more…)

The post A week in security (December 9 – 15) appeared first on Malwarebytes Labs.

Read more

Threat spotlight: The curious case of Ryuk ransomware

Credit to Author: Jovi Umawing| Date: Thu, 12 Dec 2019 22:33:53 +0000

From comic book death god to ransomware baddie, Ryuk ransomware remains a mainstay when organizations find themselves in a crippling malware pinch. We look at Ryuk’s origins, attack methods, and how to protect against this ever-present threat.

Categories:

Tags:

(Read more…)

The post Threat spotlight: The curious case of Ryuk ransomware appeared first on Malwarebytes Labs.

Read more

Emotet’s Central Position in the Malware Ecosystem

Credit to Author: Andrew Brandt| Date: Mon, 02 Dec 2019 14:01:28 +0000

As the world rolls into another Cyber Monday, and online shoppers continue their hunt for the best deals, SophosLabs wants to remind you that there&#8217;s a metaphorical malware elephant in the room that would like nothing more than to steal financial information, and the use of your computer, for nefarious ends. The Emotet Ecosystem infographic, [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/ItFCW7TqIXw” height=”1″ width=”1″ alt=””/>

Read more