Category: Kamban
This article provides a comprehensive look at crypters, software that disguises malware to evade antivirus detection. The discussion covers the basic operations of crypters, their increasing use in cybercrime, as well as the specifics of how PolyCrypt functions. Any tool or technique that promotes secrecy is music to the ears of dubious malicious attackers, who…
Read MoreTelikom LimitedIndustry: TelecommunicationsCountry: Papua New GuineaLocations: 22Employees: 1000+Web: Telikom.com.pg Download PDF Telikom Limited is the leading telecommunications company in the South Pacific region operating its own leading systems and technology. It offers both retail and wholesale voice & data broadband services, through its entirely digital network and extensive optical fibre systems spanning over five decades. At Telikom…
Read MoreThis article looks at ransomware trends of 2023, such as an increase in supply chain attacks, the use of double extortion, law enforcement actions against large networks, a focus on small and medium-sized businesses more than ever and calls for payments to be banned in lieu of ransomware. 1. Double Extortion Became a Key Tactic…
Read MoreCompany: Bonanza CasinoIndustry: GamingCountry: Reno, NevadaEmployees: 150+Web: bonanzacasino.com Download PDF A favorite with Reno locals, the Bonanza Casino, a family owned and operated business, first opened its doors in 1973. The casino is home to two restaurants, the Cactus Creek Prime Steakhouse, ten-time “Best of Nevada” winner and the Branding Iron Café. As an independent boutique casino,…
Read More2024 has started out with the highest number of January attacks we’ve ever recorded, with 76 attacks representing a 130% increase compared to 2022’s figures. Education topped the list of targeted industries, followed by healthcare and manufacturing. LockBit was the most active ransomware group this month, with Akira knocking BlackCat off the second-place spot for…
Read MoreMSP vs MSSP Solutions: Which Is Right For Your Business? Securing a business from cyberthreats is a vital activity for any organization, regardless of size or sector. But often, firms lack the necessary skills or resources to achieve this on their own. This is where turning to managed providers can prove hugely beneficial. Smaller companies…
Read MoreThe fact that over 10,000 organizations appeared on leak sites in 2023, the most since 2019, is a microcosm of the growing ransomware menace. Leak sites are a name-and-shame tactic used by ransomware operators to extort ransom fees from organizations that refuse to pay. Leak sites do not reveal the full scope of impact from…
Read MoreBlackFog has been recording publicly disclosed ransomware attacks since 2020, and in 2023 we also began recording the number of undisclosed attacks, those that are listed on the data leak sites and dark web by the attackers. The 2023 ransomware attack report summarizes the key findings from 2023 compared to previous years. 2023 was a…
Read MoreWe explore the Badbox and Peachpit malware on Android, which granted illegitimate users backdoor access to Android devices and home networks. It details how the Triada mobile trojan formed the basis for Badbox, infecting over 74,000 devices by modifying Android OS and remaining hidden. Does malware come to mind when you think about streaming devices…
Read MoreA staggering 91% of ransomware attacks now involve data exfiltration, typically to servers in China or Russia, marking a major evolution beyond file encryption. This exponential rise in exfiltration creates endless extortion potential, sparks legal action, allows tailored demands, and fuels future breaches. According to our 2023 Annual Ransomware Report, 91% of all ransomware incidents…
Read MoreRecent Posts
- Red Hat Updates Present ‘Huge’ Partner Opportunities in OpenShift, Edge
- US govt officials’ communications compromised in recent telecom hack
- Microsoft patches Windows zero-day exploited in attacks on Ukraine
- Leaked info of 122 million linked to B2B data aggregator breach
- Dell NativeEdge Platform Brings AI To Edge Operations