Results for: ransomware

ransomware 3
Ransomware exposes poor data management hygiene

Ransomware exposes poor data management hygiene

As ransomware attacks continue to proliferate, the soft underbelly of IT — how organizations often manage their data in a cavalier manner — is finally being exposed. Ransomware combines social engineering techniques, malware, and encryption to take an organization’s data hostage. As...

/ April 28, 2016
samsam_petya_ransomware
Samsam and Petya: The New Wave of Ransomware

Samsam and Petya: The New Wave of Ransomware

Malware development, like any other area in IT, is a hotbed of innovation and change. At the forefront of this trend are the groups responsible for developing ransomware applications such as TeslaCrypt and Cryptowall. Today’s news brings two new challengers:...

/ March 30, 2016
ransomware
TeslaCrypt 4.0 ransomware ups the ante with unbreakable encryption

TeslaCrypt 4.0 ransomware ups the ante with unbreakable encryption

When TeslaCrypt first arrived on the ransomware scene about a year ago, it seemed like a CryptoLocker copycat with a few new tricks, such as renaming existing files, deleting browser history to hide the source of the infection, and a...

/ March 24, 2016
ransomware
KeRanger brings ransomware to the Mac

KeRanger brings ransomware to the Mac

Not too long ago one of the benefits of using a Macintosh for work was that there wasn’t enough of these systems in place to make it worthwhile for hackers to target them. Fast forward to today, and the growing...

/ March 8, 2016
2025 trends
Cybersecurity 2025 trends: Key emerging threats

Cybersecurity 2025 trends: Key emerging threats

Welcome to part two of our deep dive into 2025’s cybersecurity landscape. As highlighted in part one of this blog, generative artificial intelligence (GenAI) and supply chain vulnerabilities are at the forefront of cyberthreats. We consulted with other industry experts...

/ April 22, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical CentreStack and Triofox vulnerability

Cybersecurity Threat Advisory: Critical CentreStack and Triofox vulnerability

A critical security vulnerability, tracked as CVE-2025-30406, has been disclosed in Gladinet’s CentreStack and Triofox file-sharing platforms. According to reports, this flaw arises from the presence of hardcoded administrative credentials embedded in default software builds. Attackers can use these credentials...

/ April 19, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Windows zero-day vulnerability actively exploited

Cybersecurity Threat Advisory: Windows zero-day vulnerability actively exploited

A newly discovered Windows zero-day vulnerability, CVE-2025-29824, is actively exploited by a targeted ransomware campaign involving the PipeMagic trojan. Continue reading this Cybersecurity Threat Advisory to limit the impact of this vulnerability. What is the threat? CVE-2025-29824 is critical flaw...

/ April 18, 2025
Cybersecurity 2025
Cybersecurity 2025 trends: GenAI and supply chains top of the threat list

Cybersecurity 2025 trends: GenAI and supply chains top of the threat list

It is hard to believe that we are now over three months into 2025. With Q1 in the books, we have approached the one-third of the year mark. This is a good time to pause and survey stakeholders and cybersecurity...

/ April 15, 2025
Automated Threat Response (ATR) for firewalls
Automated Threat Response (ATR) for firewalls

Automated Threat Response (ATR) for firewalls

In the last 12 months, Barracuda Managed XDR’s Automated Threat Response (ATR) for firewalls prevented thousands of potentially serious attacks against customers. It does so by correlating advanced threat intelligence and other tools, such as AI and machine learning to...

/ April 14, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Apache RCE vulnerability

Cybersecurity Threat Advisory: Apache RCE vulnerability

A critical remote code execution (RCE) vulnerability in Apache Parquet, identified as CVE-2025-30065, with a CVSS score of 10.0, has been discovered. Continue reading this Cybersecurity Threat Advisory to learn how to effectively mitigate your risks. What is the threat?...

/ April 9, 2025