By lowering the price of Windows, could Microsoft help stop the spread of mass ransomware worms? India seems to think so. But fresher versions of Windows won't be a cure-all.
Ransomware has evolved from its early sneaker-net roots, leveraging the Internet and email to spread to different computers. However, it still follows a predictable script, not all that different from the original AIDS Trojan.
In this guide, we'll help you better understand the role that bitcoin plays in ransomware,...
Sixty-five percent of security leaders consider their organizations' security postures to be above average or superior, as compared to peers in their sectors.
Yet, only 29 percent say that they are very confident in the effectiveness of their security controls, and nearly half say that they have gaps in detecting...
Like in the recent WannaCry attacks, the U.S. healthcare sector has so far mostly avoided becoming a victim of NotPetya, the malware menacing many organizations across the globe. Who had been affected so far?
As the WannaCry outbreak demonstrated, many organizations run outdated operating systems. Too often when systems - and especially embedded devices - still function, there isn't a convincing business case for upgrading. ESET's Mark James asks: Whose fault is that?
When malware comes gunning for your national health service, you're going to take it personally. And that's just one reason why the WannaCry outbreak in particular boosted cybersecurity awareness in the U.K. and around the world, says Barracuda's Hatem Naguib.
As the count of NotPetya victims grows, Ukraine warns that it's also being targeted with a new WannaCry lookalike that hit state power distributor Ukrenergo. Security researchers say that marks the fourth recent campaign targeting Ukraine that's based on lookalike ransomware.
The latest edition of the ISMG Security Report leads with an analysis exploring how artificial intelligence can be used by hackers to threaten IT systems and by organizations to defend critical digital assets. Also, a deep dive into the NotPetya ransomware attack.
Deducing intent from malware code is tricky, but computer security experts appear to agree that the latest wave of file-encrypting malware was never designed to make its creators rich. Instead, it's intended to destroy disks.
Ransomware is a rapidly evolving challenge for organizations of all sizes. Although the vast majority of ransomware attacks are spread by email through malicious links or attachments, devices can also be infected through several other vectors, including "driveby" downloads whereby a vulnerable victim system is...
WannaCry and Petya are just the latest examples. Ransomware has been a major contributor to the majority of successful attacks in the past year, and has caused untold amounts of financial losses for the victims. The actors behind this threat have continuously shifted and improved their ability to execute these...
Malware known as NotPetya, SortaPetya or GoldenEye continues to spread globally, infecting endpoints via leaked Equation Group exploits as well as built-in Windows tools. Here's a roundup of what we know about the supposed ransomware and its spread so far.
The Cyber Threat Alliance is developing playbooks that will show organizations how to stop hackers from causing havoc. Alliance President Michael Daniel explains how the playbook could help to disrupt a cyber attacker's business model and processes.
Is Petya worse than WannaCry? The second global outbreak of file-encrypting malware in as many months sees cyberattackers having designed potent, rapidly spreading malicious code far faster than organizations have been shoring up their defenses.
64 percent of threat alerts are not addressed each day, and 52 percent of these alerts are improperly prioritized by systems and must be manually reprioritized. Security pros are overwhelmed by vulnerabilities that could be simple to mitigate, if only they had the right info at the right time.
Download this...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.