REvil With a Cause? The Kaseya Ransomware Attack
An affiliate of the notorious REvil gang, best known for extorting $11 million from the meat-processor JBS after a Memorial Day attack, infected thousands of victims in at least 17…
An affiliate of the notorious REvil gang, best known for extorting $11 million from the meat-processor JBS after a Memorial Day attack, infected thousands of victims in at least 17…
According to the recent report from the UK's Royal United Services Institute for Defence and Security Studies (RUSI), post-incident services have become one of the success stories of cyber insurance…
The 11th installment in a series published by the NATO Cooperative Cyber Defence Center of Excellence (CCDCOE) designed for military and national security decision-makers focuses on ransomware including the cases…
Addressing the DDoS problem has become more important than ever. The global pandemic almost instantly shifted the whole education system and jobs that can be done online to the home.…
According to Ralph Nickl, CEO and co-founder of Canopy, “Until recently, data protection regulations have outpaced technology and processes. Our software enables people to significantly expedite the assessment of compromised…
According to Secretary of Homeland Security Alejandro N. Mayorkas, “The cybersecurity landscape is constantly evolving and we must adapt to address new and emerging threats. The recent ransomware attack on…
According to Exterro Founder and CEO Bobby Balachandran, “Speed and accuracy are of the utmost importance when conducting large breach reviews. Historically, organizations have tried to create their own cobbled-together…
In 2020, the FBI's Internet Crime Complaint Center (IC3) received 19,369 Business Email Compromise (BEC)/ Email Account Compromise (EAC) complaints with adjusted losses of over $1.8 billion. BEC/EAC is a…
The 10th installment in a series published by the NATO Cooperative Cyber Defence Center of Excellence (CCDCOE) designed for military and national security decision-makers looks at various ways a supply…
Developed based on the European Union Agency for Cybersecurity (ENISA) framework for artificial intelligence lifecycle stages and modified through the lens of the Electronic Discovery Reference Model (EDRM), the HaystackID…