This post was guest-written in partnership with Avertium by Bob Maley, CSO at Black Kite. Foreword: Bob Maley on The Left / Right of Bang Approach As Chief Security Officer at Black Kite, there’s a military concept that I regularly apply to cybersecurity and 3rd party risk. It’s called Left of Bang. In any military […]
How much are you willing to pay to get your personal data back? How about hundreds and thousands of personal data records stored in your company? The impacts of the global pandemic have put the healthcare industry at the top of the list for ransomware threats. In fact, healthcare cyberattacks doubled in 2020, with 28% tied to ransomware. And the truth is, ransomware is […]
Since the beginning of the global pandemic, the FBI’s Internet Crime Complaint Center (IC3) has seen a 300-400% increase in daily cybersecurity complaints – many of which are ransomware-related – as both domestic and international hackers look to take advantage of Americans’ move to less secure, remote working environments. As we move into 2021, ransomware […]
SunBurst Backdoor Overview This report is about the recently disclosed SunBurst backdoor and the related malware campaign. The malware campaign has been attributed to APT29, a GRU (Main Intelligence Directorate) Russian military cyber unit. The malware is distributed through an advanced supply chain attack designed to compromise both government and non-government entities via SolarWinds Orion, a widely […]
A ransomware attack can be a debilitating event for an unprepared person or organization. Depending on the type and value of the data stored on an infected computer, the impact of a n incident can range from a minor hiccup in operations to the death of the company. According to a recent report, ransomware demand costs […]
The COVID-19 pandemic has driven many organizations to transition to remote work without sufficient time to prepare, creating new opportunities for hackers to attack vulnerable systems and unsuspecting users. This article delves into how the rush to maintain “business as usual” during crisis may have caused an organization to overlook the impacts telework incident response […]
Security incidents are expensive and timely detection is key. You can develop a more relevant IR plan by assessing vulnerabilities through a pen test.