Remove awareness 12 report-organizations-remain-vulnerable-to-increasing-insider-threats
article thumbnail

‘Unpacking’ technical attribution and challenges for ensuring stability in cyberspace

SecureList

When reports of a cyberattack appear in the headlines, questions abound regarding who launched it and why. Knowing the technical aspects of an attack may allow victims to build stronger defences, patch gaps and increase their cyber-resilience. Introduction. How then can they find out who was behind an attack and why?

article thumbnail

Ransomware world in 2021: who, how and why

SecureList

The threat may have been around a long time, but it’s changed. In this report, we take a step back from the day-to-day ransomware news cycle and follow the ripples back into the heart of the ecosystem to understand how it is organized. And not without good reason. Part I: Three preconceived ideas about ransomware.