According to a Threat Landscape Trends report for Q2 2020, cryptojacking saw a 163% increase in detections, compared to previous quarters. 35% of organizations indicated in a survey by NinjaRMM, that ransomware attacks resulted in up to $5 million in damages. Similarly we see an explosion in DDoS attacks. In times...
Sophos recently released its 2021 State of Ransomware report, and it includes surprising findings on remediation costs, which have more than doubled over the past year. Dan Schiappa tackles the question: Does it pay to pay ransoms?
The average amount of time that online attackers camp out in a victim's network - or "dwell time" - has been declining, FireEye's Mandiant incident response group reports. But the surge in ransomware accounts for some attacks coming to light more quickly because those attackers announce their presence.
Due to their unique ownership structure, for-profit law firms must balance targeted threats to their organization with a goal to minimize non-billable activity such as lengthy security procedures. This means cyber security can slip down the priority list until a breach occurs, exposing client data and sensitive market...
Amid a surge in destructive ransomware attacks, Datto CISO Ryan Weeks says we “are losing ground” to the adversaries. He offers insight from a new Global Ransomware Report and the start of a multisector Ransomware Task Force.
Whether it is from the SolarWinds attack, another nation-state APT, or the new generation of advanced (human-operated) ransomware, the mission is still the same. We must have a security strategy and tactics that quickly identifies an attacker once they have established a beachhead inside the infrastructure - attacker...
Big game hunters are targeting financial services companies in an effort to extort larger payouts by bringing their services to a screeching halt using Denial of Service (DoS) and threats to leak the data.
Download this white paper and learn:
Top tactics, techniques and procedures used to deploy ransomware
The...
Targeted ransomware - or as Microsoft refers to it, “human-operated ransomware” - is a new type of ransomware created by an attacker that’s designed to target a specific organization, and is increasingly using “lock and leak” as a tactic to try and increase the number of successful payouts.
Download this...
You’ve seen the destructive ransomware attacks of 2020, and there is no reason to expect a letup in 2021. Joe Levy, CTO of Sophos, discusses adding automation to human-led threat-hunting to create a more rapid response to ransomware strikes.
In this eBook interview transcript with Information Security Media...
Fraud in the interactive voice response channel was growing before the pandemic. Since? IVR fraud has become “a fraudsters’ playground,” says Mark Horne, CMO of Pindrop. He shares a new account-centric defensive solution.
In this eBook, Horne discusses:
The growth of IVR fraud;
New research findings about...
It's not just that ransomware attacks are up in 2020; it's that attackers have evolved their tactics and techniques. And Deepen Desai of Zscaler says this means it's time for organizations to completely reimagine their ransomware defenses.
As organizations increasingly move to cloud services, have more work locations, adopt Bring-Your-Own-Device policies, and deploy Internet of Things (IoT) devices into their networks, their traditional way to protect a network perimeter must change. The castle-and-moat model of hardening network perimeters to prevent a...
MITRE has launched a knowledge base named Shield that captures capabilities surrounding Active Defense and adversary engagements. The very first publication of this knowledge base is in the form of a matrix listing capabilities for Active Defense. From a defender's perspective, the ATT&CK matrix provides a data model...
Ransomware has become progressively more advanced resulting in median ransomware payments increasing by around 150% at the beginning of 2020,while showing no sign of slowing or stopping. Organizations must take a different approach to thwart these more aggressive and destructive attackers. The Attivo Networks Endpoint...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.