-
Cloud Security Ransomware
Jan 28, 2025
Ransomware Targets AWS S3 Buckets: How to Prevent Encryption Without Recovery
A new ransomware threat, known as Codefinger, is targeting users of AWS S3 Buckets.
Daniel Miller
2 min read
-
Ransomware Speed Data
Jun 21, 2023
Speed Data: The Commoditization of Cybercrime With Matt Radolec
Megan Garza
2 min read
-
Ransomware
Dec 01, 2022
Four Must-Know Cyber Tips for Your Business
Stories like Catch Me If You Can (the tale of how con artist Frank Abagnale duped everyone in his orbit) envoke a desire in many people to be as clever and confident as Frank, who used his charm and wit to convince people of just about anything. After a big data breach, it’s natural to look for a similar story about how an attacker used craft and cunning to trick their victim into “letting them in.” We imagine the attacker calling the victim with a convincing cover story. Something along the lines of, “This is Bill from IT, and I work with Janet— you know Janet? Well…I’m sorry you’re getting all those notifications on your phone at 3 a.m. If you give me that pin code, I’ll get it sorted for you.”
Yaki Faitelson
3 min read
-
Ransomware
Jun 25, 2022
Ryuk Ransomware: Breakdown and Prevention Tips
Although Ryuk ransomware is named after a famous Japanese anime villain, the threat it presents to businesses and organizations is far from fiction. First appearing in 2018, Ryuk ransomware has been targeting any number of both public and private sector entities, most notably hospitals and healthcare facilities in recent years.
David Harrington
6 min read
-
Ransomware
May 16, 2022
Why Every Cybersecurity Leader Should ‘Assume Breach’
In February, information about the highly successful Conti ransomware group leaked after it declared its full support of the Russian government—vowing to respond to any attack, cyber or otherwise, against Russia with "all possible resources to strike back at the critical infrastructures of an enemy." Radical circumstances create radical change. Think about how the world and our behaviors changed almost overnight with Covid-19. I'd like to highlight a few points from the leaked Conti chats.
Yaki Faitelson
3 min read
-
Ransomware
May 06, 2022
Bad Rabbit Ransomware
What is Bad Rabbit ransomware? Bad Rabbit is ransomware belonging to the Petya family of ransomware that hit over 200 organizations throughout Eastern Europe in October of 2017. Targets were primarily Russian media agencies however various corporate networks throughout Russia, Eastern Europe, and Japan were hit due to the method that ransomware used to spread through networks.
Michael Raymond
3 min read
-
Ransomware
Feb 25, 2022
Ransomware-as-a-Service Explained: What is RaaS?
Ransomware as a service (RaaS) is a major threat to all cybersecurity data and systems. Similar to Software-as-a-Service, RaaS provides easy subscription-based access to ransomware to those with little-to-no programming expertise.
David Harrington
4 min read
-
Ransomware
Jan 24, 2022
What Every CEO Should Know About Modern Ransomware Attacks
Like most businesses, cybercriminals have adapted and adjusted over the past two years. Modern attackers have learned to launch more destructive ransomware campaigns while becoming more efficient and adept at evading law enforcement. We now see ransomware gangs quickly rebrand themselves after a disruption, with new names and new infrastructure. DarkSide, the ransomware group behind several prominent attacks, seems to have rebranded as BlackMatter.
Yaki Faitelson
3 min read
-
Ransomware
Aug 16, 2021
What is Ransomware? Types and Definitions of Ransomware Attacks
In this article, we’ll define ransomware, explore the different types of ransomware and the risks associated, and discuss how you can protect yourself from ransomware attacks. You’ll learn how ransomware works and what each various attack is seeking to accomplish. We’ll also put things into context in terms of real-world attacks like the recent one affecting Colonial Pipeline. And with a handy glossary at the end, you’ll be well informed and equipped with all the information you need about how ransomware works.
David Harrington
7 min read
-
Ransomware
Mar 28, 2016
Samas, Cerber, Surprise: Three New Ransomware Variants to Have On Your Radar
As of late, the weekly press coverage of ransomware has been building a kind of brand recognition that’s the envy of many legitimate IT vendors. Ransomware’s own success has made it difficult to differentiate between the quickly evolving product variants — differences with how you get infected, what’s encrypted, ransom amount and special new features.
Michael Buckbee
6 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital