-
Tackling Ransomware’s Grip on Education
Educational institutions are facing a crisis. Over a short period of time, K-12 schools and universities became heavily reliant on technology. From online classes to managing student records, digitization is being embraced to enhance learning experiences and increase administrative efficiency. However, digital transformation comes at a cost – exposing these organizations to cyber threats. From an…
-
$100K vs. $150M – From Ransom to Clean Up
For a CEO, CISO, or a security professional, nothing instigates a wave of panic like receiving a dreaded message such as “Your files have been encrypted” with a link that reveals a ransom demand. However, sometimes what is most feared – the ransom demand – is not the financial punch that hurts the most. Often,…
-
Log4j Is Still Causing Havoc: What We Learned From Log4Shell
If you knew you were at risk for diabetes or cancer, you’d take all the necessary precautions to avoid or delay onset. You’d go for routine checkups and tests to ensure that if signs of the disease appear, you could catch it early, treat it, and hopefully avoid a deadly outcome. A company’s cybersecurity health…
-
How SSO can lead to a Pass-The-Hash Attacks
Apple AirTags. Google Maps. Single sign-on technology. What do these three seemingly random tech advancements have in common? Each was created to make our daily experiences more convenient, yet each has been exploited for evil purposes. Stalkers are using AirTags to track the whereabouts of unsuspecting victims; criminals are plotting attacks and burglaries using detailed…
-
Double Extortion – Where We Are Now
In 2019, the Maze ransomware organization was the first to use double extortion assaults. Since then, a growing number of ransomware gangs have embraced this tactic. Research published in 2021 by Group-IB says that the number of firms that have had their data exposed on a data breach site has increased by 935%, demonstrating that…
-
Why Bad Actors are Transitioning to Rust
Round and round we go. It’s the nature of cybersecurity. Hackers discover an exploitable attack avenue, and a patch is then created to block it, except it doesn’t end there. Hackers just find another vulnerability and the battle rages on. It’s not just cybersecurity companies that must constantly innovate to remain relevant. Hackers must do…