I will repeat my warning again this video contains some adult content and humour so do not watch it if you are easily offended. For the rest of us, this video by John Oliver on his Last Week Tonight show is a great explanation about ransomware – if you have …
A record number of ransomware attacks
This not not good reading – an increase in ransomware attacks: March 2023 broke ransomware attack records with 459 incidents (bleepingcomputer.com) Your takeaway is – you need a plan for ransomware! If you’d like a little help with this have a look at my recent mini-series on ransomware: Ransomware – …
LockBit ransomware for Macs
Read the article, but the headline here tells you nearly everything you need to need to know. Ransomware for Macs. LockBit ransomware encryptors found targeting Mac devices (bleepingcomputer.com) This is the first time the prolific LockBit ransomware gang have deployed encryption malware that operates on Apple’s MacOS.
Not Ransomware!
I recently wrote a mini-series of articles looking at various aspects of ransomware and what you need to do about it. Ransomware – A Primer – Smart Thinking Solutions That series mainly concentrated on encryption ransomware but the cyber gangs are also turning to extortion ransomware – so I wrote …
School data compromised
Ransomware can happen to any organisation. Tanbridge House School in West Sussex has paid an unstated fee to keep their information out of the public domain and secret following a ransomware attack. Students and teachers at English high school impacted by ransomware attack (therecord.media) However The Ransom House cyber criminals still …
Extortion Ransomware
I have a couple of articles over on CyberAwake looking at the issue of extortion ransomware and offering some tips for small and medium organisations on how to protect their information using tools they already have. From Encryption Ransomware To Extortion Ransomware Part I From Encryption Ransomware to Extortion Ransomware …
As promised yesterday…
… more about extortion ransomware and what you can do about defending your information from it: From Encryption Ransomware To Extortion Ransomware Part I – CyberAwake This first part looks at defending critical accounts from compromise.