HackDig : Dig high-quality web security articles

The C-Suite Is Optimistic About Ransomware. Are They Right?

The majority of C-suite executives are confident in their organization’s protection against ransomware attacks. At least, that’s what a recent research report from ISC2 shows. In fact, just 15% express a lack of confidence. Does this confidence take into account the nearly 53% rise in double extortion ransomware attacks between January and Febru
Publish At:2022-06-21 10:19 | Read:178 | Comments:0 | Tags:Risk Management Threat Research ransomware attacks Ransomwar

QBot Now Attacks Using Black Basta Ransomware

QBot is a banking virus active since 2007 that steals user data and banking credentials. The malware contains novel distribution methods, C2 tactics, and anti-analysis characteristics. Some campaigns distribute Qbot directly, but it’s also a supplementary payload for Emotet.QBot (QuakBot) is a Windows malware that steals bank credentials, and Windows d
Publish At:2022-06-07 10:50 | Read:393 | Comments:0 | Tags:Cybersecurity News ransomware attacks ransomware

Black Basta Besting Your Network?

This post was written with contributions from Chris Caridi and Kat Weinberger. IBM Security X-Force has been tracking the activity of Black Basta, a new ransomware group that first appeared in April 2022. To date, this group has claimed attribution of 29 different victims across multiple industries using a double extortion strategy where the attackers not o
Publish At:2022-05-26 14:27 | Read:301 | Comments:0 | Tags:Intelligence & Analytics Network Threat Hunting Threat Intel

Ransomware demands acts of kindness to get your files back

The great thing about working in the world of cybersecurity is that there’s always something new. You may think you’ve seen it all, and then something comes along that completely surprises you.And that’s certainly true of the GoodWill ransomware, which security firm CloudSEK described this week.In fact, the GoodWill ransomware stands out so
Publish At:2022-05-26 10:20 | Read:461 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Goodwill m

ITG23 Crypters Highlight Cooperation Between Cybercriminal Groups

IBM Security X-Force researchers have continually analyzed the use of several crypters developed by the cybercriminal group ITG23, also known as Wizard Spider, DEV-0193, or simply the “Trickbot Group”. The results of this research, along with evidence gained from the disclosure of internal ITG23 chat logs (“Contileaks”), provide new
Publish At:2022-05-19 06:20 | Read:416 | Comments:0 | Tags:Malware Security Services Threat Intelligence Threat Researc

New DOJ Team Focuses on Ransomware and Cryptocurrency Crime

While no security officer would rely on this alone, it’s good to know the U.S. Department of Justice is increasing efforts to fight cyber crime. According to a recent address in Munich by Deputy Attorney General Lisa Monaco, new efforts will focus on ransomware and cryptocurrency incidents. This makes sense since the X-Force Threat Intelligence Index
Publish At:2022-05-09 10:09 | Read:503 | Comments:0 | Tags:Advanced Threats Banking & Finance Data Protection Fraud Pro

Ransomware Targeted Attacks: CISO Mitigation Playbook

Hello there!  Today we will discuss something scary but interesting: The “Ransomware attack”. Occasionally we hear from people about their data being tied up, and it’s not accessible. This happens due to malware attacks. Malware is malicious software that is usually attached to the email, embedded in links, hidden in ads at various sites that your
Publish At:2022-03-22 03:44 | Read:1737 | Comments:0 | Tags:News CISO Mitigation Ransomware ransomware attacks ransomwar

Expert Insights: What’s Next for Ransomware?

Last year, many organizations stopped talking about when the workforce would be back full-time in the office. Instead, they focused on how we build a hybrid work model for the future. 2021 was active and interesting – for lack of a better word. There’s a lot to say in terms of cyber crime in general and ransomware specifically. As we progress fu
Publish At:2022-03-03 10:08 | Read:525 | Comments:0 | Tags:Advanced Threats Data Protection Incident Response Threat Hu

Ransomware Resilience Tops Findings in X-Force Threat Intelligence Index 2022

For the third year in a row, ransomware was the top attack type globally in 2021, despite some successes last year by law enforcement to take down ransomware groups. This was among the top findings of IBM Security’s latest research published in the tenth annual X-Force Threat Intelligence Index, a comprehensive overview of the global threat landscape
Publish At:2022-02-23 06:12 | Read:1627 | Comments:0 | Tags:Zero Trust CISO Threat Intelligence Threat Research vishing

Why Local Governments Remain at Risk of Cyber Crime

While big-name incidents fill the headlines, local governments and agencies face cyber crime at an alarming rate. In a very direct way, this impacts everyone’s life. The pandemic has forced state and local groups to deploy defenses at a distance over their networks and apps. But local security is often not encrypted and insecure, with no improvements
Publish At:2022-01-31 11:55 | Read:1466 | Comments:0 | Tags:Data Protection Risk Management Security Services ransomware

Active Ransomware Recovery: Five Steps for Success

When it comes to ransomware, it’s a matter of when not if. The data tells the tale. Both the volume and types of ransomware attacks are on the rise. Plus, attackers aren’t just after enterprises. They now target businesses of all shapes and sizes. That way, they increase their chances of breaching security perimeters and convincing businesses to
Publish At:2022-01-27 10:07 | Read:826 | Comments:0 | Tags:Data Protection Incident Response Risk Management ransomware

What CISA Incident Response Playbooks Mean for Your Organization

What does the latest U.S. federal ruling on cybersecurity mean for you? The recent executive order and U.S. Cybersecurity & Infrastructure Security Agency (CISA) commentary on it could provide a good framework for defending against ransomware and other attacks. In its executive order on ‘Improving the Nation’s Cybersecurity,’ the White
Publish At:2022-01-24 11:55 | Read:858 | Comments:0 | Tags:Data Protection Risk Management ransomware attacks ransomwar

Everything You Need To Know About Ransomware Attacks and Gangs In 2022

Ransomware is a lucrative business for criminals. It is paying off, and it is working.  According to a recent Trend Micro report, a staggering 84% of US organizations experienced either a phishing or ransomware attack in the last year. The average ransomware payment was over $500,000. Bad actors want to keep cashing in. So they’re going as far as
Publish At:2022-01-03 10:06 | Read:2345 | Comments:0 | Tags:Data Protection Endpoint Incident Response Risk Management S

2021 Manufacturing and Supply Chain Security Roundup

In 2020, ransomware actors demanded $17 million from a laptop maker and $34 million from a Taiwanese electronics contract company. The past two years have also delivered major disruptions for supply chains. The pandemic pushed supply chain attack issues front-and-center, with disruptions up 67% in 2020 and problems expected to persist as glob
Publish At:2021-12-27 11:55 | Read:2286 | Comments:0 | Tags:Incident Response Security Services Manufacturing Industry R

Ransomware Attackers’ New Tactic: Double Extortion

Need another reason to defend against ransomware instead of ending up having to find a solution other than paying it? Double extortion may be it. So, what is double extortion? When did it start? With this tactic, ransomware actors steal a victim’s data before their malware strain activates its encryption routine. They then have the option of demandin
Publish At:2021-12-23 10:06 | Read:2058 | Comments:0 | Tags:Data Protection Incident Response Risk Management Security S


Share high-quality web security related articles with you:)
Tell me why you support me <3