Ransomware Attack

309, 2021

Turn to Microsoft Endpoint Manager to Save Your Company

September 3rd, 2021|

Remote Monitoring and Management systems (RMMs), like Kaseya, SolarWinds, ConnectWise Automate, and NinjaRMM, are useful for maintaining control over your IT systems until, of course, they become the vector through which your IT systems are destroyed. Last month, attackers associated with REvil--a Russian ransomware-as-a-service (RaaS) group--breached a large Florida-based RMM company called Kaseya. It was, short of SolarWinds, possibly the ...

309, 2021

Cybercriminal recruitment, House of Representatives Debate Cybersecurity, Attackers Sale Internet Bandwidth, Dropper-as-a-Service Attacks, Insight into the Conti ransomware

September 3rd, 2021|

1.  Cybercriminals Recruit English Speakers for Business Email Compromise Administrative and technical security controls have helped to reduce the effects of business email compromise (BEC). However, as a result, some BEC threat actors struggle to develop compelling phishing email messages for English corporate audiences. According to security researchers, said threat actors are now recruiting native English speakers in mass to ...

2307, 2021

Printer Vulnerability CVE-2021-3438, China Attacks Microsoft, Pulse Secure VPN Cyberattack, Pegasus Spyware Compromised, Kaseya Ransomware Decryption Key

July 23rd, 2021|

1.  A 16-year-old Printer Vulnerability CVE-2021-3438 (CVSS score: 8.8) Impacts Millions of Infrastructures A 16-year-old vulnerability was discovered in popular corporate printers that allow hackers to gain administrative rights to perform several activities on systems, including the ability to install rogue programs, view, change, encrypt or wipe data. This critical vulnerability is prevalent in HP, Samsung, and Xerox printer software, impacting ...

907, 2021

The Kaseya Ransomware Attack SME Breakdown, DOD Data Left Unprotected, Morgan Stanley Data Breach & Email Exploitation

July 9th, 2021|

1.  Kaseya Ransomware Attackers Demand A $70 Million Ransom An affiliate of the notorious REvil ransomware gang compromised Kaseya’s virtual systems administrator (VSA) software. The Russian-linked attackers compromised the backend architecture of the IT infrastructure management tool. They used its notification capability to send a malicious update to VSA servers running on client environments. Thus, installing a ransomware code onto ...

3006, 2021

4 Reasons Why Ransomware Works

June 30th, 2021|

Putting everything else aside, there’s one thing you can’t deny about ransomware: It’s good business. After all, what would most businesses do for a 56% conversion rate? How about 56% on a $300,000 product? Ransomware, at least in the modern sense, is only about seven years old. Yet it’s already a multi-billion-dollar problem, for everyone other than the attackers themselves. ...

1806, 2021

Double Ransomware Attacks, Carnival Cruise’s Data Breach, REvil Compromises U.S. Nuclear Weapons Contractor, CVS Gets Hacked, G7 Cracks Down On Russia

June 18th, 2021|

1.  After Paying Off The First Ransomware Demand, Most Firms Face A Second Ransomware Attack Security experts discovered that ransomware attackers deploy secondary ransomware attacks against firms that pay off initial ransom demands. After paying off a ransom demand, firms often receive a decryptor for their hijacked systems. However, most attackers corrupt hijacked systems by creating backdoors that allow future ...

2105, 2021

Colonial Pipeline ransomware attack fallout, President Biden’s executive cybersecurity order, triple extortion, Truist Bank spear-phishing campaign, AXA Insurance becomes victim

May 21st, 2021|

1.  Congress introduced two bills in the wake of the Colonial Pipeline ransomware attack Following the recent ransomware attack against Colonial Pipeline, which caused gas shortages in several states, the U.S. Congress introduced two bipartisan bills designed to mitigate cybersecurity weaknesses across the nation’s critical infrastructure, including the oil and gas sector. The first congressional bill, the Pipeline Security Act, ...

1203, 2021

10 Benefits of IT Automation

March 12th, 2021|

Lighting fast compliance, robust vulnerability and patching management, and fewer IT support tickets are just a few of the benefits you can expect by empowering your IT teams with automation.

1401, 2021

JetBrains Breach, US Formally Blames Russia for SolarWinds Hack; Babuk Ransomware – Cybersecurity News and Trends

January 14th, 2021|

A Widely Used Software Company, An Entry Point For Huge U.S. Government Compromise State intelligence agencies disclosed that a popular software company (JetBrains), based in the Czech Republic and founded by three Russian engineers, is likely the entry point that Russian-sponsored threat actors used to insert back doors into numerous large technology companies and major U.S. government systems. SolarWinds, one ...

801, 2021

SolarWinds State-Sponsored Supply Chain Attack vs. Standard Supply Chain Attacks

January 8th, 2021|

Supply chain attacks became a threat actor’s goldmine in 2020. With its low barrier to entry and effectiveness, different levels of threat actors continue to leverage supply chain attacks as a viable method to facilitate far-reaching nefarious activities, including espionage, sabotage, intellectual property theft, etc.  Although the average supply chain attack is perpetrated by a cybercriminal with purely financial interests, ...

1812, 2020

Our Response to the SolarWinds Hack – A Global Cyber Pledge

December 18th, 2020|

Why should I take the #globalcyberpledge? How we're solving cybersecurity by individuals coming together and getting educated? What is the need for continuous improvement? Our privacy and freedom are under attack by foreign, state-sponsored bad actors and we’re standing by letting it happen. Why? Because the answers are right in front of us yet we remain complacent. Back in ...

Categories

Get aiden right in your inbox

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Get Updates Right In Your Inbox

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Go to Top