Dealing With Ransomware Attacks On Your Business

At its best, technology is an absolute boon for businesses. Simple computing machines make work easier, and making use of networks provides you with connectivity that allows you to quickly reach entities within and without your business. However, technology isn't invulnerable. Truth be told, ransomware attacks are on the rise in 2021. In the first half of the year, there had been more than 149 confirmed cases of Ransomware attacking businesses around the world.

Announcing new malware scanning on the Puppet Forge

The Forge team at Puppet has been hard at work for the past few months building out a malware scanning framework in order to help folks be more proactive about their security posture. Now, to be clear, this doesn't replace your own security mitigations. You should still audit untrusted code. You should still run your own virus protections. There are many layers in a robust security profile, and this is only one of them.


10 Most Dangerous New Malware and Security Threats in 2021

Cyberthreats including malware, viruses, and other security hazards are constantly evolving and becoming more dangerous and harder to detect. This makes it quite difficult to keep your data and information protected nowadays. Unless you are sure that you are absolutely protected, which is wishful thinking, you remain at risk of attacks by the latest strains of malware and security threats.

hitachi vantara

Fixing Ransomware First Requires That We Fix Security

Ransomware has become a familiar front page news topic thanks to recent high-profile attacks against a major meat producer and an East Coast operator of a critical oil pipeline. Also, consider the attack on a provider of software tools to IT outsourcing shops that let hackers paralyze hundreds of businesses on all five continents. No doubt the ransomware threat is serious, and now Washington is mobilizing to wipe out a scourge it formerly treated only as a criminal nuisance.


Fighting Ransomware: Using Ivanti's Platform to Build a Resilient Zero Trust Security Defense

Ransomware is a strain of malware that blocks users (or a company) from accessing their personal data or apps on infected iOS, iPadOS, and Android mobile devices, macOS laptops, Windows personal computers and servers, and Linux servers. Then the exploit demands cryptocurrency as payment to unblock the locked or encrypted data and apps. This form of cyber extortion has been increasing in frequency and ferocity over the past several years.

pandora fms

Our plan for world domination: take down the internet

We have been warning for a long time: Pandora FMS will control the world. We have given time to world governments to prepare, to North American villagers to prepare their bunker, for sects to draw their banners with “THE END IS NEAR”. And it is, it is indeed. Today, in our blog we reveal the secret plans of this company to overthrow the institutions and rule the world, then you will say that we did not warn you.


How logging everything helps mitigate ransomware risks

Ransomware attacks, the malicious code that attackers use to encrypt data or lock users out of their devices, have been rampant and are on the rise globally. The largest ransomware payout thus far in 2021 was made by an insurance company at $40 million. A more recent attack occurred in early July and was launched by a group called REvil. The immediate victim was a Florida company, Kaseya, that provides software to companies that manage technology for thousands of smaller firms.


Malware alert: The RedXOR and Mamba attacks and how to defend against them

Picture this: It’s a normal day of working from home as usual since the COVID-19 outbreak. After that satisfying cup of coffee, you log in. But something is wrong. No matter how many times you click, your files don’t open. Your screen is frozen and refuses to budge. And then, you see one of the worst nightmares any IT admin can imagine: “Oops, your files have been encrypted. But don’t worry, we haven’t deleted them yet.


Defending the Internet of Things from hackers and viruses

The 2010 Stuxnet malicious software attack on a uranium enrichment plant in Iran had all the twists and turns of a spy thriller. The plant was air gapped (not connected to the internet) so it couldn’t be targeted directly by an outsider. Instead, the attackers infected five of the plant’s partner organizations, hoping that an engineer from one of them would unknowingly introduce the malware to the network via a thumb drive.