article thumbnail

From Caribbean shores to your devices: analyzing Cuba ransomware

SecureList

Cuba ransomware gang Cuba data leak site The group’s offensives first got on our radar in late 2020. The gang has scored a series of resonant attacks on oil companies, financial services , government agencies and healthcare providers. This is the most popular model among ransomware gangs today.

article thumbnail

MITRE ResilienCyCon: You Will Be Breached So Be Ready

eSecurity Planet

The conference’s focus on cyber resilience doesn’t mean that organizations should abandon core security defenses like EDR , access control and firewalls , but they should be prepared for the advanced threats that will, at some point, get past them. Also read : Is the Answer to Vulnerabilities Patch Management as a Service?

Backups 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Menlo Security Finds Cloud Migration and Remote Work Gives Rise to New Era of Malware, Highly Evasive Adaptive Threats (HEAT)

CyberSecurity Insiders

.–( BUSINESS WIRE )– Menlo Security , a leader in cloud security, today announced it has identified a surge in cyberthreats, termed Highly Evasive Adaptive Threats (HEAT), that bypass traditional security defenses. The top three brands impersonated in phishing attacks are Microsoft, PayPal, and Amazon.

article thumbnail

How security professionals will rise to the challenge of cyber defense in 2022

CyberSecurity Insiders

We have seen firsthand that it takes more than an individual task force to combat ransomware and other related threats such as phishing, insider threats and more. Have hope that through the hard work and brilliant minds behind these security defenses that 2022 will not be a repeat of such high level attacks.

article thumbnail

How to Prevent Data Breaches: Data Breach Prevention Tips

eSecurity Planet

A CRM at a large financial services company might have an RTO of 15 minutes, while a storage archive for cold data may have an RTO of 12-24 hours. The more aware your team is of popular attack methods and strains of ransomware , the more you can prepare. This varies between organizations.

article thumbnail

6 Best Threat Intelligence Feeds to Use in 2023

eSecurity Planet

With so many free and low-cost threat intelligence feeds available today, it’s a smart move to integrate one or multiple feeds into your cybersecurity workflow and tools for additional security knowledge and detection capabilities. Email Address By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy.