Amid a surge in destructive ransomware attacks, Datto CISO Ryan Weeks says we “are losing ground” to the adversaries. He offers insight from a new Global Ransomware Report and the start of a multisector Ransomware Task Force.
Targeted ransomware - or as Microsoft refers to it, “human-operated ransomware” - is a new type of ransomware created by an attacker that’s designed to target a specific organization, and is increasingly using “lock and leak” as a tactic to try and increase the number of successful payouts.
Download this...
Whether it is from the SolarWinds attack, another nation-state APT, or the new generation of advanced (human-operated) ransomware, the mission is still the same. We must have a security strategy and tactics that quickly identifies an attacker once they have established a beachhead inside the infrastructure - attacker...
Big game hunters are targeting financial services companies in an effort to extort larger payouts by bringing their services to a screeching halt using Denial of Service (DoS) and threats to leak the data.
Download this white paper and learn:
Top tactics, techniques and procedures used to deploy ransomware
The...
You’ve seen the destructive ransomware attacks of 2020, and there is no reason to expect a letup in 2021. Joe Levy, CTO of Sophos, discusses adding automation to human-led threat-hunting to create a more rapid response to ransomware strikes.
In this eBook interview transcript with Information Security Media...
Fraud in the interactive voice response channel was growing before the pandemic. Since? IVR fraud has become “a fraudsters’ playground,” says Mark Horne, CMO of Pindrop. He shares a new account-centric defensive solution.
In this eBook, Horne discusses:
The growth of IVR fraud;
New research findings about...
It's not just that ransomware attacks are up in 2020; it's that attackers have evolved their tactics and techniques. And Deepen Desai of Zscaler says this means it's time for organizations to completely reimagine their ransomware defenses.
MITRE has launched a knowledge base named Shield that captures capabilities surrounding Active Defense and adversary engagements. The very first publication of this knowledge base is in the form of a matrix listing capabilities for Active Defense. From a defender's perspective, the ATT&CK matrix provides a data model...
As organizations increasingly move to cloud services, have more work locations, adopt Bring-Your-Own-Device policies, and deploy Internet of Things (IoT) devices into their networks, their traditional way to protect a network perimeter must change. The castle-and-moat model of hardening network perimeters to prevent a...
Ransomware has become progressively more advanced resulting in median ransomware payments increasing by around 150% at the beginning of 2020,while showing no sign of slowing or stopping. Organizations must take a different approach to thwart these more aggressive and destructive attackers. The Attivo Networks Endpoint...
In this discussion-based panel event, Frank Johnson, battle-tested, ransomware survivor Public Sector CIO and Chris Fedde, Board Member of
Votiro, will review lessons learned from Frank's experience dealing with a breach.
Along with stories from inside the breach, this session will also explore how best to...
Ransomware is a prevalent cybersecurity threat. Threat actors are constantly changing tactics looking for new ways to force ransom payments. With each new emerging ransomware threat family, the size and scope of threats are more aggressive too. This has led to incredible increases in the average ransoms paid over the...
A panel of IT forensic, legal and insurance experts will speak to the ever-present theme of data exfiltration threats in ransomware scenarios, how to protect against it, how to deal with it when it happens and the ensuing challenges.
Ransomware creators are acutely aware that network or endpoint security controls pose a fatal threat to any operation, so they've developed a fixation on detection logic. Modern ransomware spends an inordinate amount of time attempting to thwart security controls, tilling the field for a future harvest.
Download this...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.