Main menu

ransomware

What are Double Extortion Demands?

red email icon with phishing hook through it

Ransomware operators are now frequently operating with a one-two punch: through the so-called trend of "big game hunting", once they have infiltrated a network, they move laterally through it with the aim of gaining as many access points as possible, maximizing the percentage of the environment under their control. After having operationally impacted a large percentage of server-side infrastructure, that's when they deploy the ransomware message. 

Coronavirus-related Scams Exploit WFH Vulnerabilities

hacker figure silhouetted against field of text

Research by ZDNet has shown that tens of thousands of new unique coronavirus-themed domains are being created on a daily basis. Unfortunately, research also points to 90% of those webpages as being scam sites, with the most likely purpose that of distributing malware. 

More worrisome news? Ransomware has shot up anywhere from 72%-105%. Brute-force attacks are up 400%.

Cybersecurity Expert to Present Session on Cyberthreats at ABE’s TechExpo

businessman clicking icon for cybersecurity shield

There is a war going on. A cyberwar, to be exact, with companies big and small under attack daily. As managed IT specialists, we spend a good portion of our time fighting against the villains of the web to keep people and corporate assets safe. We believe knowledge shared is knowledge gained in this fight. That’s why we decided to enhance our biannual TechExpo offerings with a session specific to cybersecurity and ransomware.