Big game hunters are targeting financial services companies in an effort to extort larger payouts by bringing their services to a screeching halt using Denial of Service (DoS) and threats to leak the data.
Download this white paper and learn:
Top tactics, techniques and procedures used to deploy ransomware
The...
Targeted ransomware - or as Microsoft refers to it, “human-operated ransomware” - is a new type of ransomware created by an attacker that’s designed to target a specific organization, and is increasingly using “lock and leak” as a tactic to try and increase the number of successful payouts.
Download this...
You’ve seen the destructive ransomware attacks of 2020, and there is no reason to expect a letup in 2021. Joe Levy, CTO of Sophos, discusses adding automation to human-led threat-hunting to create a more rapid response to ransomware strikes.
In this eBook interview transcript with Information Security Media...
It's not just that ransomware attacks are up in 2020; it's that attackers have evolved their tactics and techniques. And Deepen Desai of Zscaler says this means it's time for organizations to completely reimagine their ransomware defenses.
MITRE has launched a knowledge base named Shield that captures capabilities surrounding Active Defense and adversary engagements. The very first publication of this knowledge base is in the form of a matrix listing capabilities for Active Defense. From a defender's perspective, the ATT&CK matrix provides a data model...
Ransomware has become progressively more advanced resulting in median ransomware payments increasing by around 150% at the beginning of 2020,while showing no sign of slowing or stopping. Organizations must take a different approach to thwart these more aggressive and destructive attackers. The Attivo Networks Endpoint...
As organizations increasingly move to cloud services, have more work locations, adopt Bring-Your-Own-Device policies, and deploy Internet of Things (IoT) devices into their networks, their traditional way to protect a network perimeter must change. The castle-and-moat model of hardening network perimeters to prevent a...
In this discussion-based panel event, Frank Johnson, battle-tested, ransomware survivor Public Sector CIO and Chris Fedde, Board Member of
Votiro, will review lessons learned from Frank's experience dealing with a breach.
Along with stories from inside the breach, this session will also explore how best to...
Ransomware is a prevalent cybersecurity threat. Threat actors are constantly changing tactics looking for new ways to force ransom payments. With each new emerging ransomware threat family, the size and scope of threats are more aggressive too. This has led to incredible increases in the average ransoms paid over the...
A panel of IT forensic, legal and insurance experts will speak to the ever-present theme of data exfiltration threats in ransomware scenarios, how to protect against it, how to deal with it when it happens and the ensuing challenges.
Ransomware creators are acutely aware that network or endpoint security controls pose a fatal threat to any operation, so they've developed a fixation on detection logic. Modern ransomware spends an inordinate amount of time attempting to thwart security controls, tilling the field for a future harvest.
Download this...
This article discusses a case that started with an email from a brand-new MTR customer.
The customer had just heard that a third-party vendor they work with had been hit by ransomware and was worried they might also be affected.
Download this case to get a deeper analysis about how:
The script was a downloader...
Join experienced incident response investigators Shane Shook, PhD - Advisor & Venture Consultant, Forgepoint Capital, and Tim Keeler, Co-founder & CEO at Remediant, as they exchange war stories of stopping ransomware and lateral movement from past investigations.
They will also showcase a live demo of how state...
Back when the world was introduced to WannaCry, a potent strain of ransomware code that infected and paralyzed 230,000 computers across 150 countries.
In what would become a troubling theme, WannaCry, and subsequent strains of ransomware, could have been prevented from becoming a public nuisance had proper...
Many companies have already been hit by a ransomware attack- or will be. Technically astute hackers continue their ability to infiltrate ransomware so much, that Ransomware as a Service is now available on the darknet. In today's hyper connected world, it could be only a matter of time until 'something' happens. How...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.