Results for: ransomware

FTC lays down the ransomware law
The chair of the Federal Trade Commission (FTC) is advising businesses that the FTC might hold them accountable for not fixing vulnerabilities commonly exploited by cybercriminals launching ransomware attacks. FTC Chairwoman Edith Ramirez says the actual ransom demand is usually...

Ransomware Highlights the Need to Manage Data Protection as a Process
Under the heading of an ill wind always blows some good, the rise of ransomware has certainly moved data protection up the IT agenda. There are very few IT organizations these days that are not at the very least considering...

Ransomware driving backup and recovery conversations for MSPs
Backup and recovery may not have always been the sexiest of IT topics, but thanks to the rise of ransomware it is now one of the hottest. The single most effective defense against ransomware is an ability to recover an...

Cerber ransomware targets Microsoft Office 365 users
First identified back in March, Cerber ransomware made headlines again recently after reportedly targeting Microsoft Office 365 users through a large-scale zero-day attack. Outside estimates say the email was sent to millions of Office 365 users and that it took...

Ransomware exposes poor data management hygiene
As ransomware attacks continue to proliferate, the soft underbelly of IT — how organizations often manage their data in a cavalier manner — is finally being exposed. Ransomware combines social engineering techniques, malware, and encryption to take an organization’s data hostage. As...

Samsam and Petya: The New Wave of Ransomware
Malware development, like any other area in IT, is a hotbed of innovation and change. At the forefront of this trend are the groups responsible for developing ransomware applications such as TeslaCrypt and Cryptowall. Today’s news brings two new challengers:...

TeslaCrypt 4.0 ransomware ups the ante with unbreakable encryption
When TeslaCrypt first arrived on the ransomware scene about a year ago, it seemed like a CryptoLocker copycat with a few new tricks, such as renaming existing files, deleting browser history to hide the source of the infection, and a...

KeRanger brings ransomware to the Mac
Not too long ago one of the benefits of using a Macintosh for work was that there wasn’t enough of these systems in place to make it worthwhile for hackers to target them. Fast forward to today, and the growing...

Municipal cybersecurity: MSPs navigate the front lines of digital defense
American cities are under siege in cyberspace, and the managed service providers (MSPs) they depend on are their best hope for defense. Last week, St. Paul, Minnesota, declared a state of emergency after a “deliberate, coordinated digital attack” forced the...

Cybersecurity Threat Advisory: SonicWall SMA arbitrary file upload vulnerability
Attackers are actively exploiting CVE-2025-40599, a critical vulnerability in SonicWall’s Secure Mobile Access (SMA) devices, to upload arbitrary files and gain unauthorized access. This flaw enables them to execute malicious code and compromise affected systems. The Akira ransomware group is...