Remove threat-intelligence attackers-focus-on-more-disruptive-ransomware-infections
article thumbnail

GUEST ESSAY: Preparing for the dire cybersecurity consequences of Russia’s invasion of Ukraine

The Last Watchdog

Cyberattacks preceded Russia’s invasion of Ukraine, and these attacks continue today as the war unfolds. These Russian cyber actors are government organizations and include other parties who take their orders from the Russian military or intelligence organizations – while not technically under government control. Cyber attack targets.

article thumbnail

Supply chain attacks are closing in on MSPs

Webroot

If you attended Black Hat this year, you couldn’t avoid the topic of supply chain attacks. Supply chain attacks are cyberattacks targeting an upstream vendor for the ultimate purpose of compromising one or more of its customers. A few recent, high-profile attacks bear recalling to demonstrate the scope of the problem.

InfoSec 131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LemonDuck Shows Malware Can Evolve, Putting Linux and Microsoft at Risk

eSecurity Planet

The LemonDuck malware that for the past couple of years has been known for its cryptocurrency mining and botnet capabilities is evolving into a much broader threat, moving into new areas of cyber attacks, targeting both Linux and Microsoft systems and expanding its geographical reach, according to security researchers with Microsoft.

Malware 144
article thumbnail

The top 4 ransomware gang failures of 2023

Malwarebytes

Ransomware gangs care about one thing: Stealing money. Worst of all, they show no sign of slowing down, and their extortion attempts—which no longer focus on ransomware delivery alone—are getting bolder, meaner, and uglier. Considering all this, it’s pretty damn nice to see ransomware gangs lose.

article thumbnail

Nation States Will Weaponize Social and Recruit Bad Guys with Benefits in 2022

McAfee

McAfee Enterprise and FireEye recently released its 2022 Threat Predictions. The threat actors know this, and our appetite toward accepting connections from people we have never met are all part of our relentless pursuit of the next 1,000 followers. Prediction: Lazarus Wants to Add You as a Friend. By Raj Samani. But guess what?

article thumbnail

Cybersecurity in 2022, Predictions for digital ecosystem facing more challenges and sophisticated threats

CyberSecurity Insiders

Also, that threat actors, especially state-sponsored, and criminal enterprises would take advantage of the expanding cyber-attack surface by using their resources to employ more sophisticated means for discovering target vulnerabilities, automating phishing, and finding new deceptive paths for infiltrating malware. Ransomware.

article thumbnail

Best Disaster Recovery Solutions for 2022

eSecurity Planet

But more recently, a lot more has been put on the DR plate. Ransomware has now emerged as one of the key reasons to have a DR plan and DR technology in place. A massive disruption like Colonial Pipeline experienced can be enough to put a company out of business. Disaster Recovery and Ransomware.

Backups 128