Ransomware has evolved as the potential victims have taken steps to protect themselves. Ransomware – One First there was malware to encrypt your information, then a payment demand for the decryption key. In the days when businesses thought that a backup was a luxury, this was a real money maker …
More on Risk
Diana has continued our series looking at how to assess organisational risk when it applies to cyber security. This series is running on our sister site CyberAwake. Today’s article looks at some practical ways to understand your risks: Assess The Cyber Security Risk – CyberAwake …and the earlier risk articles… …
CISA adds Adobe ColdFusion to its Known Exploited Vulnerabilities Catalog
The US government Cybersecurity and Infrastructure Security Agency (CISA) keeps an excellent database of software and firmware that it knows are being exploited in the wild. Adobe’s ColdFusion has been added to that database, the Known Exploited Vulnerabilities Catalog: CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA This …
Continue reading “CISA adds Adobe ColdFusion to its Known Exploited Vulnerabilities Catalog”
I do not want to think ransomware has gone away…
I have not been talking about ransomware as much recently – but it has not gone away – ask Estée Lauder: Estée Lauder beauty giant breached by two ransomware gangs (bleepingcomputer.com) Follow the Money Hackers do t for money. Research from the cryptocurrency tracing firm Chainalysis shows that victims have …
Continue reading “I do not want to think ransomware has gone away…”
Do you run a risky business?
We have published another part of our series on the cyber security risk every organisation faces and what you need to do about it. I say we, as Diana and I are writing it together. The Risks So Far Risk. Where do you start? Risk Appetite Risk Assessment – Understanding …