ransomware

November 13, 2019

THREAT RESEARCH

Hunting For LolBins

Attackers’ trends tend to come and go. But one popular technique we’re seeing at this time is the use of living-off-the-land binaries — or “LoLBins”. LoLBins are used by different actors combined with fileless malware and legitimate cloud services to improve chances of staying undetected within an organisation, usually during post-exploitation attack phases. Living-off-the-land tactics […]

August 21, 2019

THREAT RESEARCH

What you — and your company — should know about cyber insurance

It’s no longer a question of “if” any given company or organization is going to be hit with a cyber attack — it’s when. And when that attack comes, who...

July 11, 2019

THREAT RESEARCH

Should governments pay extortion payments after a ransomware attack?

When it comes to ransomware attacks this year, it’s been a tale of three cities. In May, the city of Baltimore suffered a massive ransomware attack that took many of its...

May 13, 2019

SECURITY

Practical Ways to Reduce Ransomware Impact: Actions You Can Take Today

During the past year, Cisco Security Incident Response Services has provided emergency incident response services for many customers dealing with incidents that sometimes become a ransomware event. In...

April 30, 2019

THREAT RESEARCH

Sodinokibi Ransomware Exploits WebLogic Server Vulnerability

Attackers are actively exploiting a recently disclosed vulnerability in Oracle WebLogic to install a new variant of ransomware called "Sodinokibi," which attempts to encrypt user data and then deletes shadow copy backups to make data recovery more difficult.

March 20, 2019

THREAT RESEARCH

Ransomware or Wiper? LockerGoga Straddles the Line

LockerGoga is a ransomware variant that, while lacking sophistication, can still cause extensive damage to organizations or individuals. Talos has also seen wiper malware impersonate ransomware, such as NotPetya.

February 14, 2019

SECURITY

Today’s critical threats: A Cisco Security threat report

Download a copy of our first 2019 Threat Report, Defending against today’s critical threats today and start prepping for the things that are likely to come.

December 12, 2018

SECURITY

Nearly every threat is either on an endpoint, or it’s headed there

This is because the endpoint is, well, the end. That is where data resides; where individuals organize, communicate, and conduct nearly all activities of their lives; and is often considered...