Tag: ransomware

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Active exploit of Atlassian Confluence

Cybersecurity Threat Advisory: Active exploit of Atlassian Confluence

This Cybersecurity Threat Advisory details the exploitation of the critical vulnerability CVE-2023-22518 in the Atlassian Confluence Data Center and Server. Attackers are deploying a Linux variant of Cerber (aka C3RB3R) ransomware. This allows unauthenticated attackers to reset Confluence and create...

/ April 18, 2024
How attackers weaponize generative AI through data poisoning and manipulation

How attackers weaponize generative AI through data poisoning and manipulation

The generative AI models that today power chatbots, online search queries, customer interactions, and more are known as large language models (LLMs). The LLMs are trained on vast volumes of data and then use that data to create more data,...

/ April 8, 2024
Spring-cleaning checklist for defending against ransomware

Spring-cleaning checklist for defending against ransomware

Just like your home, your cybersecurity practices could use a spring-cleaning. It’s a great time to “dust off” you and your customers’ devices and data to ensure best practices are followed. Afterall, there is no greater mess than trying to...

/ April 5, 2024 / 12 Comments
Ransomware 2024: The new battleground is your data, not just your files

Ransomware 2024: The new battleground is your data, not just your files

Every year, cybercriminals devise new ways to steal credentials, access sensitive data, and disrupt business. In 2024, the most significant cybersecurity challenge may actually be overcoming a familiar threat: ransomware. According to the World Economic Forum (WEF), ransomware activity was up...

/ April 2, 2024
Data tampering is an underrated threat — get your backup ready

Data tampering is an underrated threat — get your backup ready

World Backup Day is an annual reminder of how important it is to have an up-to-date, readily accessible copy of everything that matters to your business. Resilient backups allow you to recover more quickly from data damage, disruption, or loss, particularly...

/ March 31, 2024
Food Supply
The role of MSPs in food supply chain cybersecurity

The role of MSPs in food supply chain cybersecurity

Food and cybersecurity seem like very different topics. When we think of our favorite potato chips or steaks to sizzle on the grill, ransomware isn’t the first thing that comes to mind. However, the food supply chain is under increasing...

/ March 7, 2024
threats
A SOC’s view on 2024 cybersecurity trends

A SOC’s view on 2024 cybersecurity trends

In the world of cybersecurity, threats are constantly evolving. Therefore, by throwing a spotlight on 2024 cyber trends, while considering what occurred in 2023, we can adapt our defenses and anticipate new emerging threats. Artificial intelligence (AI) will play a...

/ March 5, 2024
Five healthcare cybersecurity trends to monitor in 2024

Five healthcare cybersecurity trends to monitor in 2024

We’ve looked at the cybersecurity trends in store for 2024, but trends will differ by discipline in the months ahead. For instance, industrial settings have their own set of vulnerabilities, as do finance, education, government, and healthcare. Hackers especially covet...

/ February 5, 2024
2024 forecasted cybersecurity trends

2024 forecasted cybersecurity trends

The new year always brings a panoply of possibilities and promises. No one knows the future, so it becomes a blank canvas upon which we can all project our aspirations and whims. However, the future can also be full of...

/ January 9, 2024
Beyond the horizon: Growth of cyberattacks in the 2010s

Beyond the horizon: Growth of cyberattacks in the 2010s

As part of our 5-part series on the evolution of cybersecurity, check out our fourth article below that covers IoT devices and vulnerabilities to Bitcoin-driven ransomware in the 2010s. During the 2000s, we saw the growing arms race between security...

/ January 2, 2024