CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Ransomware
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Ransomware

Virtual locks over globe showing AWS accounts expose S3 buckets to ransomware
Cyber SecurityNews

Study Shows Virtually All AWS Accounts Have Vulnerable Identities Exposing 90% Of S3 Buckets To Potential Ransomware Attacks

October 18, 2021
Cloud security firm Ermetic found that vulnerable identities and misconfigured environments on most AWS accounts expose 90% of S3 buckets to potential ransomware attacks.
Read More
Open padlock with keys on laptop keyboard showing ransomware decryption key
Cyber SecurityNews

FBI Withheld Kaseya Ransomware Decryption Key for Three Weeks; Congress Demands the Agency Explain Itself

October 6, 2021
It has been discovered that the FBI quietly held on to the Kaseya decryption key for three weeks prior to making it available to the public in a bid to "disrupt" the attack.
Read More
An iron chain and padlock on a computer keyboard showing ransomware attacks
Cyber SecurityInsights

Taking a Preventative Approach Against Ransomware

October 4, 2021
Ransomware attacks have been a highlight of mainstream media. By taking a preventative approach, businesses can deploy a combination of education, processes, hardware and software to detect, combat and recover from attacks if they were to arise.
Read More
Male doctor hand using modern laptop in clinic showing healthcare organizations need for cyber insurance against ransomware
Cyber SecurityInsights

Why “Ransomware Insurance” Causes Healthcare Industry to Overlook Deeper, Underlying Security Issues

September 2, 2021
For the healthcare sector where 34% of all organizations were hit by ransomware last year, cyber insurance may seem like a good investment. However, this may give many organizations a false sense of security.
Read More
Hacker pointing finger at laptop screen showing ransomware via social engineering
Cyber SecurityNews

Nigerian Threat Actors Skip Social Engineering, Make Direct Pitches to Employees To Install Ransomware on Company Networks

August 25, 2021
Most ransomware attacks begin with some combination of phishing and social engineering. An enterprising ransomware gang in Nigeria appears to be skipping this messy step, simply making a direct pitch to employees to join in on the attack.
Read More
Colleagues having meeting in boardroom showing ransomware issue
Cyber SecurityNews

Ransomware: A Perfect Storm

August 20, 2021
The only way to keep a company’s defense up-to-date against ransomware attacks is with constant proactive activity from well-engineered cybersecurity teams.
Read More
Two female IT engineers working with computer in dark server room showing ransomware solution
Cyber SecurityInsights

Ransomware and Returning to the Basics of Cybersecurity

August 18, 2021
Far from sensationalizing ransomware attacks, our response should be to return to the basics of cybersecurity. This requires a converged IT-OT security strategy to limit damage and protect valuable assets.
Read More
Composition of globe with network of connections in background showing ransomware and security awareness
Cyber SecurityInsights

Ransomware: From Minor Annoyance to a Significant Global Threat

August 17, 2021
Ransomware has quickly grown from an annoyance to a life-threatening problem plaguing organizations in all industries. Organizations should address the two most common attack vectors, open RDP on the internet and the human factor.
Read More
Hacker using laptop with progress loading bar on screen in dark room showing ransomware supply chain attack on MSP
Cyber SecurityNews

Ransomware Group Connected to JBS Incident Thought to be Behind Massive MSP Supply Chain Attack

July 6, 2021
Hackers timed a supply chain attack to hit when IT workers were off duty. An attack on MSPs making use of Kaseya products is thought to have compromised at least 200 of that company's clients.
Read More
Hand using laptop with glowing padlock interface showing solution for ransomware and double extortion
Cyber SecurityInsights

Ransomware at Its Worst: The Rise of Double Extortion and How To Stop Them at the Front Door

May 4, 2021
Remote Browser Isolation (RBI) is an emerging technology that has been constantly evolving and has come of age as a solution to stop ransomware attacks, including double extortion.
Read More
Load More

Latest

Board members sits at a table in a meeting room showing personal liability

Personal Liability for Directors Who Disregard Cybersecurity

Police car with roof mounted strobe lightbar showing law enforcement data breach

Data Breach on DEA Law Enforcement System Grants Cyber Criminals Access to 16 Databases

VPN logo on smartphone lying on laptop showing VPN providers to hand over customer data

VPN Providers Ordered by Indian Government To Hold All Customer Data for Five Years, Hand Over to Government Upon Request

National Stadium and residential buildings with mountains in the background in San Jose, Costa Rica showing Conti ransomware

Could a Cyber Attack Overthrow a Government? Conti Ransomware Group Now Threatening To Topple Costa Rican Government if Ransom Not Paid

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results