Close

Articles Posted in Ransomware

Updated:

Power Grids and Points of Vulnerability: Keeping the Lights on Amid Cybersecurity Concerns

Alicia McKnight and Brian Finch urge energy industry players to evaluate cybersecurity risks posed by increasingly interconnected and internet-enabled power grids in an article which was published in the latest edition of Pratt’s Privacy & Cybersecurity Law Report.

Updated:

News of Note for the Internet-Minded (8/30/23) – Ransomware, Quantum Attacks and a New LLM

In this week’s News of Note, ransomware attacks break records and wipe data for a majority of a cloud provider’s customers, while one RaaS case delivers useful details about cybercriminal techniques and tactics. Also, the development of algorithms to protect against quantum computers continues, facial recognition software nabs an elderly…

Updated:

News of Note for the Internet-Minded (5/27/22) – Ransomware Attacks, Crypto Crashes and Genetic NFTs

In this week’s News of Note, ransomware continues to ravage institutions—including a 157-year-old college and the government of Costa Rica—AI learns to accurately predict a patient’s race based on their medical images, cryptocurrency crashes, and more. Threat intelligence research firm AdvIntel claims that the Conti ransomware organization has splintered into…

Updated:

News of Note for the Internet-Minded (4/19/22) – IP and NFTs, Virtual Reality & Ransom(every)ware

In today’s News of Note, we explore ransomware-as-a-service profits, the continued untangling of IP issues with NFTs, the prospect of scented virtual reality experiences, the development of a humanoid robot, and much more. Hackers use source code revealed in Conti ransomware leak to target Russian organizations. (Lawrence Abrams, Bleeping Computer)…

Updated:

News of Note for the Internet-Minded (3/11/22) – AI Tools, NFT Trading and Ransomware Misdeeds

Is Russia’s invasion of Ukraine altering the landscape of the internet? Can AI help historians decipher ancient texts? How did two siblings allegedly use a digital token to defraud investors? Explore this and more in today’s News of Note. As AI gets better at interpreting human emotions, how is it…

Updated:

Protect, Mitigate and Recover: Making Your Company Ransomware-Resistant

As is the case with many types of cybersecurity threats, shielding one’s company from ransomware attacks calls for measures that simultaneously build the strongest protections possible while also adopting mitigation strategies that assume those measures will fail. Here are some essential steps that can lessen a company’s vulnerability while also…

Updated:

Shifting Landscapes and Veiled Identities: The Usual Suspects Behind Ransomware Attacks

The actors behind ransomware tend to fall into two categories: cybercriminal gangs, often based in Eastern Europe, and groups backed by economic outcasts like Iran, Russia and North Korea. Historically the first prefer a shotgun approach; the second behave more like snipers. Here are a few of the groups that…

Updated:

The Many-Headed Threat of Ransomware

It may seem that the very term “ransomware” wasted little time going from “newish-sounding threat” to expected, constant presence in the news and IT meetings alike. But, of course, it’s ultimately just a modern word for one of the oldest crimes out there—holding someone or something hostage until someone else…