Results for: ransomware

cerber ransomware
Cerber ransomware targets Microsoft Office 365 users

Cerber ransomware targets Microsoft Office 365 users

First identified back in March, Cerber ransomware made headlines again recently after reportedly targeting Microsoft Office 365 users through a large-scale zero-day attack. Outside estimates say the email was sent to millions of Office 365 users and that it took...

/ June 30, 2016
ransomware 3
Ransomware exposes poor data management hygiene

Ransomware exposes poor data management hygiene

As ransomware attacks continue to proliferate, the soft underbelly of IT — how organizations often manage their data in a cavalier manner — is finally being exposed. Ransomware combines social engineering techniques, malware, and encryption to take an organization’s data hostage. As...

/ April 28, 2016
samsam_petya_ransomware
Samsam and Petya: The New Wave of Ransomware

Samsam and Petya: The New Wave of Ransomware

Malware development, like any other area in IT, is a hotbed of innovation and change. At the forefront of this trend are the groups responsible for developing ransomware applications such as TeslaCrypt and Cryptowall. Today’s news brings two new challengers:...

/ March 30, 2016
ransomware
TeslaCrypt 4.0 ransomware ups the ante with unbreakable encryption

TeslaCrypt 4.0 ransomware ups the ante with unbreakable encryption

When TeslaCrypt first arrived on the ransomware scene about a year ago, it seemed like a CryptoLocker copycat with a few new tricks, such as renaming existing files, deleting browser history to hide the source of the infection, and a...

/ March 24, 2016
ransomware
KeRanger brings ransomware to the Mac

KeRanger brings ransomware to the Mac

Not too long ago one of the benefits of using a Macintosh for work was that there wasn’t enough of these systems in place to make it worthwhile for hackers to target them. Fast forward to today, and the growing...

/ March 8, 2016
Cyber insurance
Cyber insurance: A must for MSPs

Cyber insurance: A must for MSPs

If you don’t carry cyber insurance yet, you may want to reconsider. Statistics show that if you are an MSP owner, you probably already have it, with 91.7 percent of managed service providers (MSPs) carry cyber insurance specifically for their operations,...

/ May 20, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: SAP critical vulnerabilities

Cybersecurity Threat Advisory: SAP critical vulnerabilities

SAP has released patches to address a second vulnerability, CVE-2025-42999, affecting its SAP NetWeaver tool. The vulnerability involves a privilege escalation issue that, when chained with SAP’s CVE-2025-31324 vulnerability (unauthenticated file upload flaw in SAP NetWeaver Visual Composer), can enable...

/ May 16, 2025
soc threat radar
SOC Threat Radar — May 2025

SOC Threat Radar — May 2025

In this edition of the SOC Threat Radar, Barracuda Managed XDR’s security solutions, threat intelligence, and SOC analysts highlight key developments from the past month that organizations should have on their radar, including: A 38% rise in attacks targeting FortiGate...

/ May 12, 2025 / 7 Comments
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Commvault Command Center vulnerability

Cybersecurity Threat Advisory: Critical Commvault Command Center vulnerability

Commvault Command Center has been impacted by a critical security vulnerability, CVE-2025-34028, with a CVSS score of 10. This vulnerability enables remote code execution (RCE). Review the details of this Cybersecurity Threat Advisory to minimize the risk from this threat....

/ May 7, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: BYOI endpoint detection and response bypass

Cybersecurity Threat Advisory: BYOI endpoint detection and response bypass

A sophisticated attack technique known as “Bring Your Own Installer” (BYOI) has been employed by threat actors to bypass SentinelOne’s tamper protection, facilitating the deployment of Babuk ransomware. This method leverages legitimate installers to execute malicious payloads, effectively evading endpoint...

/ May 7, 2025