Tag: ransomware

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Black Basta ransomware surge

Cybersecurity Threat Advisory: Black Basta ransomware surge

The Cybersecurity and Infrastructure Security Agency (CISA) has issued advisories in response to the widespread of Black Basta ransomware attacks. Review the recommendations detailed in this Cybersecurity Threat Advisory to defend against ransomware attacks and extortion. What is the threat?...

/ May 16, 2024
Threat Spotlight: The remote desktop tools most targeted by attackers in the last year

Threat Spotlight: The remote desktop tools most targeted by attackers in the last year

Remote desktop software allows employees to connect into their computer network without being physically linked to the host device or even in the same location. This makes it a useful tool for a distributed or remote workforce. Unfortunately, remote desktop...

/ May 1, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Active exploit of Atlassian Confluence

Cybersecurity Threat Advisory: Active exploit of Atlassian Confluence

This Cybersecurity Threat Advisory details the exploitation of the critical vulnerability CVE-2023-22518 in the Atlassian Confluence Data Center and Server. Attackers are deploying a Linux variant of Cerber (aka C3RB3R) ransomware. This allows unauthenticated attackers to reset Confluence and create...

/ April 18, 2024
How attackers weaponize generative AI through data poisoning and manipulation

How attackers weaponize generative AI through data poisoning and manipulation

The generative AI models that today power chatbots, online search queries, customer interactions, and more are known as large language models (LLMs). The LLMs are trained on vast volumes of data and then use that data to create more data,...

/ April 8, 2024
Spring-cleaning checklist for defending against ransomware

Spring-cleaning checklist for defending against ransomware

Just like your home, your cybersecurity practices could use a spring-cleaning. It’s a great time to “dust off” you and your customers’ devices and data to ensure best practices are followed. Afterall, there is no greater mess than trying to...

/ April 5, 2024 / 12 Comments
Ransomware 2024: The new battleground is your data, not just your files

Ransomware 2024: The new battleground is your data, not just your files

Every year, cybercriminals devise new ways to steal credentials, access sensitive data, and disrupt business. In 2024, the most significant cybersecurity challenge may actually be overcoming a familiar threat: ransomware. According to the World Economic Forum (WEF), ransomware activity was up...

/ April 2, 2024
Data tampering is an underrated threat — get your backup ready

Data tampering is an underrated threat — get your backup ready

World Backup Day is an annual reminder of how important it is to have an up-to-date, readily accessible copy of everything that matters to your business. Resilient backups allow you to recover more quickly from data damage, disruption, or loss, particularly...

/ March 31, 2024
Food Supply
The role of MSPs in food supply chain cybersecurity

The role of MSPs in food supply chain cybersecurity

Food and cybersecurity seem like very different topics. When we think of our favorite potato chips or steaks to sizzle on the grill, ransomware isn’t the first thing that comes to mind. However, the food supply chain is under increasing...

/ March 7, 2024
threats
A SOC’s view on 2024 cybersecurity trends

A SOC’s view on 2024 cybersecurity trends

In the world of cybersecurity, threats are constantly evolving. Therefore, by throwing a spotlight on 2024 cyber trends, while considering what occurred in 2023, we can adapt our defenses and anticipate new emerging threats. Artificial intelligence (AI) will play a...

/ March 5, 2024
Five healthcare cybersecurity trends to monitor in 2024

Five healthcare cybersecurity trends to monitor in 2024

We’ve looked at the cybersecurity trends in store for 2024, but trends will differ by discipline in the months ahead. For instance, industrial settings have their own set of vulnerabilities, as do finance, education, government, and healthcare. Hackers especially covet...

/ February 5, 2024