These tools were intended for use in security research and other authorized purposes. However, cybercriminals have found a way to exploit them for ransomware campaigns. What are some of these tools and how exactly are they weaponized?
Many employees have set up makeshift work spaces in their homes. This could leave them more susceptible to ransomware attacks that take advantage of vulnerabilities in unsecured spaces.
Der Jahresbericht zur Cybersicherheit wirft einen Blick zurück auf dieses außergewöhnliche Jahr und untersucht die wichtigsten und vordringlichsten Sicherheitsprobleme, die sich 2020 zeigten.
Ransomware continues the trend of targeted attacks but with the added challenge of double extortion. Organizations need to be one step ahead of such coercive tactics to avoid potential disruptions, financial losses, and reputational damage.
Starting this year, Ryuk began using another dropper called BazarLoader (also known as BazarBackdoor), which is primarily distributed via phishing emails that contain either malicious attachments or links to websites that host malware.
Our infographic shows how Trend Micro XDR is designed to combat threats like Ryuk using machine learning and analytics to correlate various events across multiple layers.
Der Sicherheitsüberblick zur Jahresmitte 2020 befasst sich eingehend mit den Herausforderungen in der Zeit der Pandemie. Dabei geht es auch um Bedrohungen in Zusammenhang mit COVID-19 und gezielte Ransomware-Angriffe.
Maze ransomware, notorious for not just encrypting but for stealing victims’ data, attacks a US IT firm. The company sent emails to customers which include IP addresses and file hashes that have been linked to previous Maze attacks.