Remove 2022 Remove DDOS Remove Ransomware Remove Security Defenses
article thumbnail

From Caribbean shores to your devices: analyzing Cuba ransomware

SecureList

Cuba ransomware gang Cuba data leak site The group’s offensives first got on our radar in late 2020. The Cuba group, like many others of its kind, is a ransomware-as-a-service (RaaS) outfit, letting its partners use the ransomware and associated infrastructure in exchange for a share of any ransom they collect.

article thumbnail

2024 State of Cybersecurity: Reports of More Threats & Prioritization Issues

eSecurity Planet

Fortunately, vendor surveys identify five key cybersecurity threats to watch for in 2024: compromised credentials, attacks on infrastructure, organized and advanced adversaries, ransomware, and uncontrolled devices. NetScout: Observed 13,142,840 DDoS attacks, including: 104,216 video gaming enterprise attacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Pain of Double Extortion Ransomware

Thales Cloud Protection & Licensing

The Pain of Double Extortion Ransomware divya Thu, 02/16/2023 - 06:10 Ransomware perpetrators are adopting more sophisticated attack techniques with much success. Ransomware attacks have become much more dangerous and have evolved beyond basic security defenses and business continuity techniques like next-gen antivirus and backups.

article thumbnail

How security professionals will rise to the challenge of cyber defense in 2022

CyberSecurity Insiders

We have seen firsthand that it takes more than an individual task force to combat ransomware and other related threats such as phishing, insider threats and more. Have hope that through the hard work and brilliant minds behind these security defenses that 2022 will not be a repeat of such high level attacks.

article thumbnail

5 Linux malware families SMBs should protect themselves against

Malwarebytes

There’s no shortage of reasons why an SMB might use Linux to run their business: There are plenty of distros to choose from, it’s (generally) free, and perhaps above all — it’s secure. But unfortunately, there’s more to Linux security than just leaning back in your chair and sipping piña coladas. 024BTC (~$720 USD as of June 2022).

Malware 103
article thumbnail

How Secure Is Cloud Storage? Features, Risks, & Protection

eSecurity Planet

CSP’s Professional Security Expertise CSPs’ professional security expertise substantially contributes to the security capabilities and improvement of the general resilience of cloud storage. DDoS Attacks DDoS attacks flood cloud services with traffic, overwhelming capacity and causing service outages.

Risk 122
article thumbnail

Weekly Vulnerability Recap – October 2, 2023 –  WS_FTP, Exim, Cisco and Other Exploited Vulnerabilities

eSecurity Planet

This shared certificate is then abused to bypass Cloudflare DDoS security and launch DDoS attacks against known server IP addresses. Considering the active ransomware activity with vulnerabilities in Progress Software’s other file transfer software, MOVEit, WS_FTP server maintenance teams should patch ASAP.

DDOS 107