Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Malware

ALPHV BlackCat Ransomware: A Technical Deep Dive and Mitigation Strategies

ALPHV, also known as BlackCat or Noberus, is a sophisticated ransomware group targeting critical infrastructure and various organizations, including being the most active group used to attack the financial services sector. ALPHV first appeared in November 2021 and operates on a Ransomware-as-a-Service (RaaS) model, allowing affiliates to use its malware for their own attacks in exchange for a cut of the ransom payments.

How To Detect and Remove a Keylogger

You can detect a keylogger if you notice unfamiliar apps on your device, slower performance speeds, a lag in mouse movements or strange background noises on phone calls. A keylogger is a type of malware that requires an entry point, such as an email or cloud program, to be installed on your device. Once it is on your device, a cybercriminal can monitor every keystroke you make to learn your login credentials and private information.

New Ransomware Threat Group, RansomHub, is so Effective, the NSA is Already Warning You About Them

The latest evolution of the ransomware service model, RansomHub, has only been around since February of this year, but its affiliates are already successfully exfiltrating data. You know you’re a problem when the U.S. government puts out a notice about you. That’s the case for RansomHub — the latest iteration of a ransomware as a service group formerly working under the names Cyclops and Knight.

Crystal Rans0m: Emerging hybrid ransomware with stealer capabilities

Crystal Rans0m is a previously undocumented hybrid ransomware family developed in Rust programming language seen for the first time in the wild on September 2nd, 2023. Interestingly, it does not only encrypt victim’s files, demanding a ransom for their release, but also steals sensitive information from the infected systems. This dual-threat approach means that attackers can double their leverage over victims, potentially increasing their chances of monetizing their attacks.

Defend Your Data Against Cyberattacks with Rubrik & CrowdStrike

With the growing volume of data and increasing cost of breaches, organizations must find ways to manage and protect their ever-expanding datasets. To address this escalating threat landscape, Rubrik and CrowdStrike have joined forces to redefine cyber defense with several integration points between our platforms. This video walks you through the latest integration between Rubrik Security Cloud and CrowdStrike Falcon Insight XDR, from installing and configuring, through how the Rubrik data context can be used by a security operator when investigating an incident.

Trailer: Measuring Your Data's Risk Exposure #CyberSecuritypodcast #CyberSecurity #shorts

Mike Tyson famously said, 'Everybody has a plan till they get punched in the face.' In cybersecurity, traditional strategies focus on preventing attacks—essentially planning for the punch. But what happens when the punch lands? It’s not just about the breach itself; it’s about how an organization responds. True resilience is measured by how swiftly and effectively you rebound. Strengthening infrastructure, refining processes, and enhancing talent are crucial steps in not just surviving but thriving after an incident.

Defending Against Attacks on Data with Rubrik and the CrowdStrike Falcon Platform

In today's digital landscape, cyber attacks are an ever-present threat, and they all ultimately target one thing: data. For most organizations, the challenge lies not only in protecting this data but also in understanding the full scope of what they have. Many organizations struggle to identify how much sensitive data they possess, where it resides, and who has access to it.

Inside the Cloud: Cloud-Based Ransomware

This is the second in a series of articles about cloud-based attack vectors. Check out our last article about admin takeovers! Inside the Cloud: Attacks & Prevention – Administrative Account Compromise Ransomware has long been associated with takeovers of endpoints. However, attackers are evolving to target cloud environments – and the effects can be devastating.

Your Lawyers Are Increasingly Targeted by Phishing Attacks, Ransomware

Researchers at Bitdefender warn that law firms are high-value targets for ransomware gangs and other criminal threat actors. Attackers frequently use phishing to gain initial access to an organization’s networks. “Phishing is one of the most common attacks in the legal field,” the researchers write. “Cybercriminals pose as legitimate entities, tricking employees into divulging sensitive information or clicking malicious links.