Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Malware

How Hive becomes one of the most dangerous ransomware group

The Hive Gang is a Ransomware as a Service (RaaS) providers first identified in June 2021. Although relatively new, their aggressive tactics and ever evolving malware variants have made them one of the most successful RaaS groups of its kind. Find out how the group has risen through the ranks with their advanced ransomware kit, API based portal and negotiation services.

Rubrik and GraphQL - Episode 5 - Interfaces and Inline Fragments

During Episode 2 we gave a very brief introduction to how we form queries in GraphQL to retrieve relevant data from the Rubrik platform. This episode will dive a bit deeper into forming queries that utilize inline fragments to gather data from types that implement other types using interfaces. If you are hunting through the documentation and you think that certain information is missing, this video might be the solution to all your problems!

The Anatomy of Wiper Malware, Part 2: Third-Party Drivers

In Part 1 of this four-part blog series examining wiper malware, we introduced the topic of wipers, reviewed their recent history and presented common adversary techniques that leverage wipers to destroy system data. In Part 2, CrowdStrike’s Endpoint Protection Content Research Team discusses how threat actors have used legitimate third-party drivers to bypass the visibility and detection capabilities of security mechanisms and solutions.

When prevention isn't better than cure

Learn to protect data from ransomware Explore real-life cybercrime examples Dive into the future of data security Learn to protect data from ransomware Register Now About half of CISOs say that their organisation is unprepared to cope with a coordinated attack. So they’re investing heavily to manage the risk. Deloitte reported that firms spend over 10% of their annual IT budget on cybersecurity. That works out at about $2-5 million per year for a typical enterprise.

Rubrik and GraphQL - Episode 4 - Powershell

Powershell is by far the most widely utilized SDK that Rubrik provides. While an SDK is currently under development to cover off everything Rubrik Security Cloud and GraphQL, this episode will show you how to make raw GraphQL API calls into the Rubrik platform using the infamous scripting tool. You will see how to form various queries and mutations within Powershell, and how to parse the returned responses - performing real-world automation scenarios with Powershell and Rubrik.

Introducing the Ransomware Content Browser

Splunk SURGe recently released a whitepaper, blog and video that outline the encryption speeds of 10 different ransomware families. The outcome of this research was that it is unlikely that a defender will be able to do anything once the encryption has started. Ransomware today is also mostly “human-operated” where many systems are sought out and compromised before any encryption activities occur and, once they do, the encryption is just too fast to meaningfully affect the damage done.

Rubrik and GraphQL - Episode 2 - GraphQL Queries

At the core of GraphQL lies the query. Queries allow us to fetch exactly the data we need from the Rubrik platform. This episode will dive into how we form basic queries to retrieve Rubrik objects for usage with automation. We’ll talk about how to form a query, create fragments, and pass data into our queries using variables.

Cross Account Replication of AWS RDS with Rubrik Security Cloud

The Relational Database Service (RDS) service offered by AWS is one of the most popular databases today. A lot of critical, confidential data resides inside of RDS. Hence it becomes imperative to protect this data from various threats and ensure that the data is secure. Our approach to protecting the data inside RDS is based on two aspects: Rubrik already supports a modern approach to safeguarding RDS data from an operational perspective and also maintains a clean, secure copy in a different region.