Magazine Button

Ransomware

Pulse Secure expert on the mutation of ransomware

Ransomware attacks have been responsible for bringing entire cities to a crippling halt this year and methods are constantly evolving. Scott Gordon, InfoSec Evangelist, Pulse Secure, discusses how enterprises and organisations can fortify their networks by implementing layered defences and applying secure access solutions.   In the last few months, mounting ransomware gangs have hit […]


Sophos reveals trove of new details about SamSam ransomware

Ransomware is universal and one of the greatest threats in cybersecurity currently. Extensive research by Sophos has uncovered a trove of new information on the notorious SamSam ransomware that has affected far more victims than previously thought and raised vastly more in ransom demands – almost US$6 million. Most ransomware is spread in large, noisy and untargeted spam campaigns […]


Check Point research: Global impact of cryptominers doubles in H1 2018

Check Point has released its Cyber Attack Trends: 2018 Mid-Year Report, revealing that cybercriminals are aggressively targeting organisations using cryptomining malware to develop illegal revenue streams. Cloud infrastructures are also a growing target for threat actors according to the research. Between January and June 2018, the number of organisations impacted by cryptomining malware doubled to 42%, […]


Post-WannaCry state of healthcare data management in Middle East

By Gregg Petersen, Regional Vice President, Middle East and Africa at Veeam Software Over a year ago, the seismic impact of the WannaCry ransomware attack made headlines around the world. Affecting more than 300,000 computers across 150 countries, the epidemic drew the attention of governments to the not-fit-for-purpose protection and management of data within the […]


Fortinet expert discusses the rise of destructive botnets

By Kalle Bjorn, Director – Systems Engineering, Fortinet Over the past few years, we have watched the rise of ransomware as it successfully targeted a variety of vertical markets, especially healthcare, education and financial services. And like almost all malware, it has also begun to evolve. For example, the WannaCry ransomware engine has recently been modified to support […]


Report: Malicious cryptocurrency miners gaining momentum

WatchGuard Technologies, a leader in advanced network security solutions, has published its latest Internet Security Report. Threat intelligence from Q1 2018 revealed that 98.8% of seemingly common Linux/Downloader malware variants were actually designed to deliver a popular Linux-based cryptocurrency miner. This is just one of several signs that malicious cryptomining malware is becoming a top […]


McAfee Labs research shows cryptocurrency mining malware surge

McAfee, the device-to-cloud cybersecurity company, has released its McAfee Labs Threats Report: June 2018, examining the growth and trends of new malware, ransomware and other threats in Q1 2018. McAfee Labs saw on average five new threat samples every second, including growth in cryptojacking and other cryptocurrency mining malware, as well as notable campaigns demonstrating […]


Is cryptojacking replacing ransomware as the next big threat?

John Madisson, Senior Vice President – Products and Solutions at Fortinet, discusses how cryptojacking is emerging as one of the biggest cyberthreats facing global organisations and enterprises. As the threat landscape continues to become more complex and more difficult to fight, it forces security to adapt to meet the demands of automation, agility and analytics. […]


Increase in ransomware attacks targeting supply chain

Cybercriminals are turning their attention to the supply chain as a new means to exploit business data. This is according to Dimension Data’s newly published Executive Guide to the NTT Security 2018 Global Threat Intelligence Report, which has revealed there was a worrying increase in ransomware and other cyberattacks targeting the supply chain in 2017. […]


Variant of SynAck ransomware uses Doppelgänging technique

Kaspersky Lab researchers have discovered a new variant of the SynAck ransomware Trojan using the Doppelgänging technique to bypass anti-virus security by hiding in legitimate processes. This is the first time the Doppelgänging technique has been seen in ransomware in the wild. The developers behind SynAck also implement other tricks to evade detection and analysis […]


Browse our latest issue

Intelligent CISO

View Magazine Archive