How Can CISOs Better Prevent Ransomware Attacks in 2024? | A step-by-step guide

Are ransomware attacks going anywhere in 2024? In short, no. Ransomware gangs are going to continue to employ sophisticated ransomware as a service (RaaS) methods, leverage critical infrastructure on the dark web and continue to share new tactics to evade law enforcement. But the way that ransomware gangs organize and deliver attacks will evolve in […]

Read More… from How Can CISOs Better Prevent Ransomware Attacks in 2024? | A step-by-step guide

The True Cost of Ransomware Attacks

Along with reputational damage, downtime, and supply chain disruptions, ransomware attacks are notoriously costly to resolve. From ransomware payment to recovery costs, along with lost profits due to disrupted business operations, we’ve reviewed 192 trillion data points in our annual report to figure out the average cost of a ransomware attack. In this ransomware cybersecurity […]

Read More… from The True Cost of Ransomware Attacks

A Global LockBit Takedown | A Guide for CISOs

LockBit_Takedown_explainer-Todd-Carroll_CybelAngel

This is a developing story with huge consequences for the global cybersecurity community. Our CISO, Todd Carroll, shares his thoughts on this significant takedown. In the last 24 hours, a significant international law enforcement effort led by the National Crime Agency (NCA) in collaboration with the Federal Bureau of Investigation (FBI) and agencies from nine […]

Read More… from A Global LockBit Takedown | A Guide for CISOs

Ransomware Targets Elasticsearch Databases

Roughly 450 Elasticsearch databases have been targeted with ransomware that replaces their indexes with a demand for $620 to return the stolen data. The threat actors demand that victims pay within seven days or the ransom is doubled. After two weeks, it seems that the data is destroyed and no recovery is available. This campaign […]

Read More… from Ransomware Targets Elasticsearch Databases

Is WannaCry Still a Threat?

WannaCry Risk

As the ransomware industry lives its golden age, the anniversary date of one of the widest ransomware attacks ever known slowly approaches. Four years ago and some 300,000 computer infections later, WannaCry ushered in the global era of cyber extortion. The remaining question is whether WannaCry has written its last words. It’s true that WannaCry […]

Read More… from Is WannaCry Still a Threat?

Fool me once: Why shadow IT needs continuous monitoring

Shadow IT Vulnerabilities

The bad guys come back The saying goes, “Fool me once, shame on you.  Fool me twice, shame on me.”  Yet when it comes to ransomware and shadow IT, many organizations do not heed this advice.   When data or networks are breached and held for ransom, many organizations pay the ransom, but fail to identify […]

Read More… from Fool me once: Why shadow IT needs continuous monitoring