How do you make sure your threat hunting efforts are effective, save you time, and improve your security? From baselining to automation, we have you covered.
Search Results For“ransomware”
The Good, the Bad and the Ugly in Cybersecurity – Week 3
Cyber cops take DarkMarket offline, CISA spot unknown threat actor targeting cloud services, and Parler offers case study in how not to secure user data.
21 Cyber Security Twitter Accounts You Should Be Following in 2021
We’ve handpicked 21 essential cybersecurity accounts across the full spectrum of security issues. From reporters to reverse engineers, discover them here.
The Good, the Bad and the Ugly in Cybersecurity – Week 2
Man behind mass sextortion campaign jailed for 11 years, Babuk is 2021’s first new ransomware entry, and scammers impersonate Australian cyber crime unit.
The Good, the Bad and the Ugly in Cybersecurity – Week 1
CISA offers tool to aid IR teams in wake of SolarWinds, a COVID-19 testing lab is taken out by ransomware, and education charity GetSchooled gets pwned.
The Good, the Bad and the Ugly in Cybersecurity – Week 52
Cops take down cybercrime VPN after a decade, 280,000 cryptocurrency users’ PII leaked on hacker forum, and hacktivists target EU Court of Human Rights.
SentinelOne’s Cybersecurity Predictions 2021 | What Can We Expect After a Year Like This?
2020 was anything but ordinary, but what lies in wait for cybersecurity in 2021? We asked a panel of experts for their top predictions for the year.
12 Months of Fighting Cybercrime | SentinelLabs 2020 Review
It has been quite a unique year in cybersecurity, cybercrime and threat intelligence. Here’s a roundup of what SentinelLabs’ researchers uncovered in 2020.
Ransomware Fallout: Talking Cyber Liabilities and Insurance
In this holiday special podcast, #Realtalk’s Aaron Bregg and guests discuss Cyber Insurance, liabilities and the increasing threat of ransomware attacks.
The Good, the Bad and the Ugly in Cybersecurity – Week 51
Indian cyber cops bust scammers targeting the US, ransomware operators adopt SystemBC malware, and SolarWinds hack continues to raise big security concerns.
Ranzy Ransomware | Better Encryption Among New Features of ThunderX Derivative
The Ranzy ransomware operators have learned from their mistakes and adapted quickly after ThunderX decryptors became publicly available.
Case Study: Catching a Human-Operated Maze Ransomware Attack In Action
Maze operators tailor attacks to the victim’s environment to evade detection. We show how they operate, and reveal a decoded HDA payload among other IOCs.
Maze Ransomware Update: Extorting and Exposing Victims
Maze ransomware doesn’t just demand payment for a decryptor but exfiltrates victim data and threatens to leak it publicly if the target doesn’t pay up.
WastedLocker Ransomware: Abusing ADS and NTFS File Attributes
WastedLocker is a relatively new ransomware that has been attacking high-value targets across numerous industries, including several Fortune 500 companies.
Breaking EvilQuest | Reversing A Custom macOS Ransomware File Encryption Routine
A new macOS ransomware threat uses a custom file encryption routine not based on public key encryption. Jason Reaves shows how we broke it.
Thanos Ransomware | RIPlace, Bootlocker and More Added to Feature Set
Thanos Ransomware has developed rapidly over the last 6 months, offering a customized RaaS tool with an expanding feature set to build unique payloads.
NetWalker Ransomware: No Respite, No English Required
NetWalker is following a now-familiar pattern: increased ransom demands, threats to leak victim data and relentless attacks during the COVID-19 pandemic.
New Snake Ransomware Adds Itself to the Increasing Collection of Golang Crimeware
The ransomware crime spree continues with threat actors increasingly turning to Golang as their language of choice. New entrant Snake is just the latest.
Meet NEMTY Successor, Nefilim/Nephilim Ransomware
Ransomware families NEMTY, Nefilim and Nephilim continue to evolve and merge, taking on aspects of other successful variants that aim to encrypt and extort.
RobinHood Ransomware “CoolMaker” Functions Not So Cool
Robinhood Ransomware is attacking government institutions from Greenville to Baltimore. How does it work and how could you stop it? Find out here.