News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Hive Ransomware: Attack Sequence 
Hive Ransomware: Attack Sequence

The course of a ransomware attack using Hive was investigated by the Varonis forensics team during a customer deployment. The attack and the actions of the cyber criminals were documented in this way. First discovered in June 2021, Hive is used as ransomware-as-a-service by cybercriminals to attack healthcare facilities, nonprofits, retailers, utilities, and other industries worldwide. Most commonly, they use common ransomware tactics, techniques, and procedures (TTPs) to compromise victims' devices. Among others, phishing emails with malicious attachments, stolen VPN credentials and vulnerabilities are used to intrude into the targeted systems….

Read more

Triple penalty: ransomware extortion, data loss, fines
Triple penalty: ransomware extortion, data loss, fines

Negligent companies are quickly punished threefold: first ransomware extortion, then data loss, and last but not least, the penalty fee for a poor recovery plan. That's how complex ransomware can invade company resources. Last year, ransomware brought a US company that produces fuel to its knees. Behind this were criminal "partner companies" of the notorious DarkSide group. A typical example of a RaaS (ransomware as a service) attack: a small core team of criminals develops malware, makes it available to other bad guys, and handles victims' ransoms. However, they lead the actual attack...

Read more

Chronology of a Midas ransomware attack

The problem of unused and forgotten tools - chronology of a Midas ransomware attack. The Sophos Rapid Response Team describes how cybercriminals proceeded in a real Midas attack case and how they moved in the network via commercial tools from October to December 2021 before finally launching the ransomware attack. With an integrated security ecosystem and Zero Trust, attackers would have had little chance of infiltrating the network and the attacked organization would have had greater control over unauthorized network access. Major attack with Midas ransomware After a ransomware attack on a technology provider in December 2021…

Read more

Infographic explains network detection and response
B2B Cyber ​​Security ShortNews

New infographic explains NDR: Network Detection and Response. Even for small and medium-sized companies, more security is within reach thanks to comprehensive monitoring of all data traffic in the network. Companies and organizations are never defenseless against even sophisticated and innovative cyber attacks. Threats reveal themselves in network traffic. At some point in their chain of attacks, hackers have to examine systems, install malware, move data and open communication paths that do not fit the typical pattern of an organization. Against manipulation in your own network The instrument with which cybersecurity specialists analyze data traffic in order to uncover attacks ...

Read more

Anatomy of a modern cyber attack
Anatomy of a modern cyber attack

Cyber ​​attacks are seldom carried out by technically skilled attackers. Traditional hacking methods such as decoding encryption or infiltrating firewalls are becoming a thing of the past. The anatomy of a cyberattack is changing. Criminals no longer hack into; they just log in. Because weak, stolen or otherwise compromised login data create an easy gateway for malicious actors, even if they have only limited technical skills. Employee logins stolen The recent data breach on Twitter, in which dozens of prominent user accounts were hijacked, is a good example of how cyberattacks are now ...

Read more

Ransomware: from the victim's point of view
Attack ransomware workplace

The specialist Sophos knows the process and the consequences of a successful ransomware attack only too well. From the victim's perspective: This is how a ransomware attack works. No organization wants to become a victim of cyber crime. But if there are security holes, it is likely that attackers will find them and exploit them. And it can be months or even longer before the victim even notices the condition. So-called incident responders help companies to identify, block and mitigate attacks and their effects. This monitoring by specialists also enables a precise analysis of attack patterns and, as a result ...

Read more