Alicia McKnight and Brian Finch urge energy industry players to evaluate cybersecurity risks posed by increasingly interconnected and internet-enabled power grids in an article which was published in the latest edition of Pratt’s Privacy & Cybersecurity Law Report.
In this week’s News of Note, ransomware attacks break records and wipe data for a majority of a cloud provider’s customers, while one RaaS case delivers useful details about cybercriminal techniques and tactics. Also, the development of algorithms to protect against quantum computers continues, facial recognition software nabs an elderly criminal, and more.
In this week’s News of Note, ransomware continues to ravage institutions—including a 157-year-old college and the government of Costa Rica—AI learns to accurately predict a patient’s race based on their medical images, cryptocurrency crashes, and more.
In today’s News of Note, we explore ransomware-as-a-service profits, the continued untangling of IP issues with NFTs, the prospect of scented virtual reality experiences, the development of a humanoid robot, and much more.
Is Russia’s invasion of Ukraine altering the landscape of the internet? Can AI help historians decipher ancient texts? How did two siblings allegedly use a digital token to defraud investors? Explore this and more in today’s News of Note.
As is the case with many types of cybersecurity threats, shielding one’s company from ransomware attacks calls for measures that simultaneously build the strongest protections possible while also adopting mitigation strategies that assume those measures will fail.
The actors behind ransomware tend to fall into two categories: cybercriminal gangs, often based in Eastern Europe, and groups backed by economic outcasts like Iran, Russia and North Korea. Historically the first prefer a shotgun approach; the second behave more like snipers. Here are a few of the groups that have been linked to recent ransomware and are still a threat.
It may seem that the very term “ransomware” wasted little time going from “newish-sounding threat” to expected, constant presence in the news and IT meetings alike. But, of course, it’s ultimately just a modern word for one of the oldest crimes out there—holding someone or something hostage until someone else pays for its release. Nonetheless, as the targets and means of these attacks have evolved, keeping track of it all has become a bit more complicated than a name on a ransom note. The ransomware landscape is constantly shifting as actors change their targets, find new points of attack and think of fresh ways to leverage encrypted data. Hundreds of variants of ransomware have been documented over the past few years, but here’s a cross-section of types posing a threat right now.