Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Malware

An assessment of ransomware distribution on darknet markets

Ransomware is a form of malicious software (malware) that restricts access to computer files, systems, or networks until a ransom is paid. In essence, an offender creates or purchases ransomware, then uses it to infect the target system. Ransomware is distributed in several ways including, but not limited to, malicious website links, infected USB drives, and phishing emails. Once infected, the offender encrypts the device and demands payment for the decryption key.

Dole Gets Hit By a Ransomware Attack and Food Shipments Stall

Dole PLC is a massive agricultural company headquartered in Dublin, Ireland. Dole has several offices and production facilities in the United States and supplies food products in 75 separate countries. The company maintains a staff of over 38,000 employees and offers more than 300 different products throughout the world.

What is Malware as a Service (MaaS)?

Malware as a Service is the unlawful lease of software and hardware from the Dark Web to carry out cyber attacks. The threat actors who use this service are provided with botnet services and technical support by the MaaS owners. This service opens doors to anyone with minimal computer skills to use and distribute pre-made malware. The data that is stolen is often sold to the highest bidder or left for the service subscribers. MaaS is an illegal version of Software as a Service (SaaS).

Dish Network Customers Lose Service Thanks to a Serious Ransomware Attack

Dish Network is one of the largest American television providers in the country today, offering television service through a direct-broadcast satellite network. The company serves more than 7.4 million customers and maintains over 16,000 employees to keep everything running properly. This huge broadcast network recently suffered from a ransomware attack that interrupted its broadcast service and may have exposed its customers as well.

Fallout from Paying Ransomware: A UK Government Perspective

In this video, we discuss the potential consequences of organizations paying ransomware, specifically from a UK government perspective. We explore the hypothetical scenario of an organization being hit by the Conti ransomware and having the financial means to pay the ransom. While this may unlock their systems and maintain business continuity, it also raises questions about the legality of paying ransoms and the potential fallout from doing so. We delve into the potential repercussions of breaking the law and the importance of having robust disaster recovery policies in place to minimize the impact of such attacks. Join us as we explore this complex and timely issue.

Analysis of Recent Official Statements on Ransomware Sanctions

James Rees questions the motivations behind the decision, whether it is due to ransomware or political sanctions. Connect with Your host James Rees Hello, I am James Rees, the host of the Razorwire podcast. This podcast brings you insights from leading cyber security professionals who dedicate their careers to making a hacker’s life that much more difficult.

The Two-Step Ransomware Attack: What British Businesses Need to Know

Ransomware attacks can cripple businesses in more ways than one. Hackers can lock up your systems and hold your data for ransom, leaving you with no choice but to pay up. In this video, we explore the two-step ransomware attack and how it can affect British businesses. We discuss how hackers can encrypt your data and demand payment to unlock it, as well as how they can exfiltrate your data and hold it for ransom.

8 Common Cybersecurity issues when purchasing real estate online: and how to handle them

More and more, people are completing the entire real estate transaction process online. From searching for properties to signing documents, online convenience can make the process easier and more efficient. However, with all of this activity taking place on the internet, it is important to be aware of the potential security risks that come along with it.