Results for: ransomware

Hackers harvest agri-business ransomware

Hackers harvest agri-business ransomware

MSPs with a portfolio of clients that include nondescript agriculture and food processing businesses, often think they are off the radar of sophisticated international hackers. Yet, this is not the case at all.

/ May 13, 2022 / 6 Comments
XaaScast by XaaS Journal: Winning the war against ransomware podcast

XaaScast by XaaS Journal: Winning the war against ransomware podcast

  Recently Adam Khan, VP of global security operations at Barracuda MSP, sat down with Jay McCall of XaaS Journal to discuss the constantly evolving threat of ransomware. If you do not know who Adam is, he has more than...

/ May 10, 2022 / 5 Comments
Ransomware headlines can protect you

Ransomware headlines can protect you

Ransomware surged in 2021 and is showing no signs of slowing down in 2022 due to the continuing pandemic and the conflict in Ukraine. According to Barracuda Network’s research, attacks on corporations, including infrastructure, travel, financial services, and other businesses,...

/ May 4, 2022 / 9 Comments
Survey finds SMBs that lack incident management may not survive ransomware

Survey finds SMBs that lack incident management may not survive ransomware

A survey of 1,200 small to medium-sized businesses (SMBs) finds nearly half would not survive a ransomware attack that caused their data to become inaccessible for three days, while 75 percent said they expect they might survive anywhere from three...

/ April 20, 2022
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Malware and Ransomware Attacks For Ukrainian organizations

Cybersecurity Threat Advisory: Malware and Ransomware Attacks For Ukrainian organizations

Threat Update In the ongoing conflict between Russia and Ukraine, security experts have been observing cyberattacks targeting Ukrainian government departments with overwhelming levels of Internet traffic and data-wiping malware. Upon further analysis, the Ukrainian government has found software and tactics...

/ February 28, 2022
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: BlackByte Ransomware Group Gaining Traction

Cybersecurity Threat Advisory: BlackByte Ransomware Group Gaining Traction

Threat Update The BlackByte Ransomware-as-a-Service group is quickly gaining traction by infecting and cryptolocking multiple companies. Reports regarding this ransomware in the wild have existed since July 2021. In response, the FBI and USSS (United States Secret Service) have issued...

/ February 15, 2022
2022 Cybersecurity Outlook, Part 2: Talent Gap, Ransomware, Healthcare

2022 Cybersecurity Outlook, Part 2: Talent Gap, Ransomware, Healthcare

This week, Smarter MSP continues our discussion with Dr. Nur Zincir-Heywood, a cybersecurity specialist and computer science faculty at Dalhousie University in Halifax, Nova Scotia. Key discussion points include specific cybersecurity challenges Canadian businesses need to be paying attention to...

/ December 29, 2021
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: BlackMatter Ransomware

Cybersecurity Threat Advisory: BlackMatter Ransomware

The FBI, CISA, and NSA have released a joint advisory about the BlackMatter Ransomware gang. This group has been gaining traction with their attacks since July 2021 and claims to be the successor of the Darkside and REvil ransomware groups....

/ November 9, 2021
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Ranzy Locker Ransomware Gaining Traction

Cybersecurity Threat Advisory: Ranzy Locker Ransomware Gaining Traction

Threat Update The FBI has warned that over 30 US-based companies have been hit by the Ranzy Locker ransomware by July this year. The alert, which was issued alongside CISA, notes that most of the victims were compromised by brute...

/ November 1, 2021
How hackers use phishing in ransomware attacks

How hackers use phishing in ransomware attacks

Phishing attacks work because people like to click on things. Hackers carefully tailor attacks to their victims by collecting publicly available personal information about them and playing to their sense of urgency to get a response. The attackers only need...

/ October 12, 2021 / 1 Comment