ransomware attack

Results 51 - 74 of 74Sort Results By: Published Date | Title | Company Name
Published By: Proofpoint     Published Date: May 17, 2017
In this complimentary guide you will learn why ransomware is surging and what to do before, during, and after an attack.
Tags : 
proofpoint, ransomware, intrusion prevention, cyberattack, data protection
    
Proofpoint
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : 
ransomware, threats, cyber, security, data
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continue to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance
Published By: Druva     Published Date: Aug 03, 2016
Ransomware has quadrupled since last year and it is estimated to be reach $1B this year. Gartner Research has outlined best practices to better prepare you for an attack and uncovers how modern backup technologies can help.
Tags : 
druva, gartner, best practices, technology, backup
    
Druva
Published By: Druva     Published Date: Aug 05, 2016
Ransomware attacks have become commonplace and affect all kinds of organizations and industries nationwide. Learn why ransomware is on the rise and actionable steps to reduce the impact of ransomware and other malware attacks on your organization.
Tags : 
cloud backup, enterprise, cloud computing, best practices, storage
    
Druva
Published By: Webroot Inc     Published Date: Sep 09, 2016
This guide will examine a number of mitigation strategies that will help protect your organizations’ data from crypto-ransomware attacks. Crypto-ransomware is no longer an annoyance. It’s a highly persistent and organized criminal activity with Ransomware as a Service (RaaS) at its core.
Tags : 
    
Webroot Inc
Published By: AuditBoard     Published Date: Nov 26, 2018
Affecting over 200,000 machines in more than 150 countries, the ransomware known as Wanna Decryptor, or “WannaCry,” became the largest cybersecurity attack in history in May 2017. The malicious software locked out users from critical data, and demanded a ransom payment to unlock the contents. Governments, hospitals, and corporations scrambled to address the attack and prevent the infection from spreading. Ironically, the virus’ execution method was simple: it exploited a vulnerable Windows SMB protocol to spread – an exploit Microsoft had addressed two months prior to the attack with the release of a patch.
Tags : 
    
AuditBoard
Published By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec
Published By: IBM     Published Date: Jun 06, 2018
System vulnerabilities, ransomware, malware, intrusions, and other malicious activities are on the rise, showing that today’s cybersecurity professionals are hard-pressed to keep enterprises secure. Although threats are growing in sophistication and attack vectors are expanding, many of the intrusions and cyber attacks happening today are simply a result of improper protections being put in place, systems going unpatched, or weak security policies. While much of the blame is being placed on cybersecurity professionals, the real blame should often be placed upon the tools and policies that many of those professionals have come to trust and the complexity that comes with them.
Tags : 
    
IBM
Published By: CarbonBlack     Published Date: Oct 26, 2016
Traditional antivirus (AV) just doesn’t cut it anymore. From ransomware that holds intellectual property hostage to sophisticated malware-less attacks that exploit PowerShell, scripting, and memory, endpoints are facing more security risk than ever before. As a result, companies have set their sights on the next generation of lightweight AV solutions.
Tags : 
    
CarbonBlack
Published By: CarbonBlack     Published Date: Oct 26, 2016
It’s become increasingly clear that traditional antivirus is no longer sufficient in stopping advanced threats such as ransomware. Companies need a next-generation antivirus (NGAV) solution to successfully stop modern attacks. Hear what Trevor Albrecht from DraftKings has to say about his experience replacing AV with NGAV.
Tags : 
    
CarbonBlack
Published By: Kaspersky     Published Date: Jun 15, 2015
Download Kaspersky Lab’s Unlock the Key to Repel Ransomware to learn common ransomware scenarios and delivery mechanisms.
Tags : 
kaspersky, ransomware, cybercrime, cyberattack, hackers, data leakage, spam, malware, ransom
    
Kaspersky
Published By: Kaspersky     Published Date: Feb 06, 2017
The total amount of damage caused by cryptomalware can be divided into two parts: the ransom and the related losses. Drawing from our survey of over 4,000 small- and medium-sized companies conducted by Kaspersky Lab and B2B International, we take a closer look at the numbers behind the damage.
Tags : 
cryptor, ransomware, malware, encryption, business security, cyberthreat, cyberattack
    
Kaspersky
Published By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
If you haven’t had first-hand experience with ransomware in the past, chances are you’ve heard of one of the many ransomware attacks that have recently caught worldwide attention. According to a June 2016 survey from Osterman Research, nearly one in two participants indicated that their organization suffered at least one ransomware attack in the last year. In this whitepaper, we’ll cover ransomware basics and provide best practices for ransomware prevention and detection. You’ll learn: • What ransomware is, how it works, and who the attackers are • 10 best practices you can employ now to detect and prevent ransomware • How you can quickly detect ransomware and other threats with AlienVault USM Download this whitepaper now to learn more about ransomware, best practices for defense, and how AlienVault USM helps you detect ransomware quickly with a unified approach to security.
Tags : 
    
AlienVault
Published By: Druva     Published Date: Aug 04, 2016
This IT guide provides actionable steps to reduce the impact of ransomware or other malware attacks. By quickly restoring data from time-indexed copies, organizations will be far less vulnerable to costly and debilitating ransom demands.
Tags : 
    
Druva
Published By: Druva     Published Date: Aug 04, 2016
This IT guide provides actionable steps to reduce the impact of ransomware or other malware attacks. By quickly restoring data from time-indexed copies, organizations will be far less vulnerable to costly and debilitating ransom demands.
Tags : 
technology, data, best practices, business technology
    
Druva
Published By: Lenovo and Intel     Published Date: Oct 17, 2016
Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!
Tags : 
security, ransomware, spyware, malware, theft, it threat
    
Lenovo and Intel
Published By: LogRhythm     Published Date: Feb 07, 2017
In February 2016, the computer network at Hollywood Presbyterian Medical Center (HPMC) was down for more than a week as the Southern California hospital worked to recover from a ransomware attack. Hospital administrators declared an internal emergency as staff struggled to access patient records and computer systems critical for patient care.
Tags : 
    
LogRhythm
Published By: IBM     Published Date: Jun 05, 2018
System vulnerabilities, ransomware, malware, intrusions, and other malicious activities are on the rise, showing that today’s cybersecurity professionals are hard-pressed to keep enterprises secure. Although threats are growing in sophistication and attack vectors are expanding, many of the intrusions and cyber attacks happening today are simply a result of improper protections being put in place, systems going unpatched, or weak security policies. While much of the blame is being placed on cybersecurity professionals, the real blame should often be placed upon the tools and policies that many of those professionals have come to trust and the complexity that comes with them.
Tags : 
    
IBM
Published By: Cohesity     Published Date: Mar 19, 2019
Every 14 seconds. That’s how often analysts predict ransomware will attack a business this year.1 Despite the best efforts to thwart ransomware attacks, cyber criminals are innovative, and they continue to create new malware. This means more sophisticated and targeted ransomware attacks are coming—all with the same goal: Disrupt business operations in the hopes victims will pay to restore order. No industry is immune. And because enterprises are now even more attractive targets than consumers,2 your organization must proactively prepare for when, not if, cyber criminals come for your data.
Tags : 
    
Cohesity
Published By: BeyondTrust     Published Date: Apr 04, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage. Our 2018 re
Tags : 
    
BeyondTrust
Start   Previous    1 2 3     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: