Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Beyond AWS Native Backup: A Simpler Path to Data Protection

We are often asked how Rubrik Security Cloud differs from AWS Backup. It's a valid question because, at first glance, the two solutions seem similar. Both have cloud-first, API-driven architectures. Both are built specifically to ensure reliable backup and recovery for data stored across AWS. Both support a wide range of the most popular AWS workloads including EC2, EBS, S3, RDS and EKS.

Building High Availability into a Large Cloud SQL Fleet, Part 2: Optimizations and Design Choices

At Rubrik, we rely on a multi-tenant architecture to store customer metadata in a large fleet of Cloud SQL database instances. With numerous production deployments globally, each supporting multiple customer accounts, maintaining high availability, performance, and robustness across this infrastructure is critical. Managing a large fleet of Cloud SQL instances and ensuring they remain resilient and performant has been a journey filled with valuable lessons.

The Hidden Cost of Hospital Cyber Attacks: What Happens to Patients? #Healthcare #DataSecurity

What happens to patients when their local hospital has a ransomware attack? How do you even find that? You collect data on every cyberattack on a healthcare provider. Next, you look at data from Medicare and then overlay those two data sets. Simple. Listen to the latest episode of the @Data Security Decoded podcast, where @Steve Stone is joined by @Hannah Neprash, PhD, Assistant Professor at the University of Minnesota School of Public Health.

WatchGuard Labs Detects 300% Surge in Endpoint Malware in Q3 2024

While malware growth is something we have been experiencing over the past few years, the increase observed by WatchGuard's threat lab team in Q3 2024 was the highest to date. Q3 saw astronomical growth in total endpoint malware threats, reaching 300.48% with 420,304 threats. The previous high was recorded in Q1 2024, when there was an 81.77% rise, almost double the previous quarter. However, Q3 almost quadrupled the figure for Q2 2024 when 104,951 threats were detected.

Scattered Spider: Weaving an ever expanding web of cybercrimes

Imagine you are the owner of a bustling casino casually observing the vibrant scene: The clatter of slot machines, wagers are being placed, the cheerful chatter of gamblers, and waiters are serving cocktails. Everything appears normal until, without warning, the machines fall silent. However, it doesn’t stop there. Elevators grind to a halt, parking gates freeze shut, and guests find themselves locked out of their rooms as digital door keys fail to function.

Is that Ra? Nope, it is RaaS - DLS emerges for New Extortion Group Anubis

In 2024, Cyjax observed the emergence of 72 extortion and ransomware group data-leak sites (DLSs). As of late February 2025, Cyjax has identified DLSs for six new groups in 2025, as noted in recent blogs on extortion groups Kraken, Morpheus, GD LockerSec, Babuk2, and Linkc. The latest DLS which Cyjax has identified is named Anubis. This Ransomware-as-a-Service (RaaS) group appears to be sophisticated and professional, providing services including affiliates, data ransoms, and access monetisation.

Faster Remediation with Data-Centric Security Insights

In this episode of Into the Breach, James Purvis and Mike Schmidt discuss how adopting a data-centric security approach can lead to faster remediation and better alert prioritization. With SOC teams overwhelmed by millions of alerts, they explore how DSPM (Data Security Posture Management) provides visibility, reduces noise, and focuses on protecting sensitive data. Learn how DSPM can help streamline security operations and safeguard your business-critical assets.

Ransomware in 2025: The Cyber Threat That Can Shut Down Your Business!

Ransomware isn’t just a cyber threat—it’s a crisis. By 2025, we’re looking at 564 million ransomware attacks targeting businesses of all sizes. If you think "This won’t happen to us," think again. Here’s what you need to know: Most attacks start with a simple phishing email. Ransom demands can reach millions—and paying doesn’t guarantee recovery. Businesses need proactive defense, not just damage control.

Malware as a Service (MaaS): The New Frontier of Cybercrime

Cybercrime has rapidly evolved, and one of the most dangerous models that has emerged in recent years is malware as a service (MaaS). This criminal business model allows anyone without advanced programming knowledge to deploy highly effective malware campaigns by paying a subscription or a one-time fee. MaaS democratizes access to malicious tools and amplifies both the quantity and sophistication of cyberattacks.