New: ransomwareAll contentburnbotblurtkractifitzzangamesr2cornellblurtboosterblurtgermancurationblurtindiapowerclubblurtlifephotographyblurtartblurtblockartblurtographybeblurtfrankbaconHotTrendingNewDAppsmrosenquist in cybersecurity • last yearNational Cybersecurity Plan Fails to Address RansomwareThe US National Cybersecurity Strategy Implementation Plan fails to address ransomware. There is a real opportunity for the government to make significant progress in crushing the growing scourge…blurtyield in crypto • 2 years agoFBI Infiltrated Hive NetworkFBI Infiltrated Hive Network, Blocking Over $130 Million in Crypto Ransomware No, not that Hive network; this is the so-called Hive ransomware network, or group. Blockchain forensic…imranahmed5298 in cybersecurity • 2 years agoUnderstanding the Basics of CybersecurityUnderstanding the Basics of Cybersecurity Cybersecurity refers to the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, and damage. With…mrosenquist in technology • 2 years agoRansomware and the Ransom ProblemDr. Chase Cunningham (aka Dr Zero Trust) and I discuss the problem of ransomware and how the industry could potentially rid itself of this growing problem.mrosenquist in cybersecurity • 3 years agoRansomware is Funding Russian AggressionRansomware attacks and payments are increasing, with most revenue going to Russian attackers. It is time to revisit outlawing Ransomware payments. Some stats to hammer the situation home: Sophos…eddwood in deutsch • 3 years agoDank Ransomware zu Bitcoin!So kam ich zu BTC!mrosenquist in cybersecurity • 3 years agoCybersecurity Insights Video - Criminalizing Ransomware Payments with Malcolm HarkinsRansomware is a growing scourge. Is it possible to eradicate this entire class of attacks? I think it is but in today’s Cybersecurity Insights interview I have a lively debate with Malcolm Harkins…mrosenquist in cybersecurity • 3 years agoNew Ransomware Bill Shows Promise But is Undermined by a Limited ScopeA new bill has been proposed to address Ransomware. Congressman Patrick McHenry recently introduced the Ransomware and Financial Stability Act of 2021. Good Direction, but Falls Short I believe it…yehey in cybersecurity • 3 years agoHow We Broke the Cloud With Two Lines of Code: The Full Story of ChaosdbHow We Broke the Cloud With Two Lines of Code: The Full Story of Chaosdb Wiz Research Team disclosed technical details about the discovery of the ChaosDB vulnerability in Azure Cosmos DB database…mrosenquist in cybersecurity • 3 years agoNew Ransomware Bill Only Benefits Traditional Financial InstitutionsRecently introduced Ransomware and Financial Stability Act (H.R.5936) is the right direction for undermining ransomware attacks, by disallowing payments, but it just does not go far enough. This…yehey in cybersecurity • 3 years agoForrester Predicts Mass Cybersecurity Brain DrainRansomware: Police Sting Targets Suspects Behind 1,800 Attacks That ‘Wreaked Havoc Across the World’ Twelve people have been targeted by an international law enforcement operation for involvement…mrosenquist in cybersecurity • 3 years agoInternational Coalition Fails to Address RansomwareU.S. leadership organized a meeting with over 30 nations to figure out how to address the growing problem of ransomware. The results were unimpressive, lacking the bold innovation needed to stem the…yehey in ransomware • 3 years agoBlackMatter RansomwareThis joint Cybersecurity Advisory was developed by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) to…rajmahamud in cybersecurity • 3 years agoSomething about hacking and hackers.Image search by www.Google.com What is hacking? . Hacking is a process where someone enters a computer or computer network without any legitimate permission. Those who do hacking are hackers.…yehey in ransomware • 3 years ago4 Chinese APT Groups Identified Targeting Mail Server of Afghan Telecommunications Firm RoshanRansomware Gangs Are Complaining That Other Crooks Are Stealing Their Ransoms Cyber criminals using a ransomware-as-a-service scheme have been spotted complaining that the group they rent the…yehey in iot • 3 years ago‘Anonymous’ Hackers Claim to Hit Website Hosting Firm Popular With Far-Right Groups100M IoT Devices Exposed By Zero-Day Bug A high-severity vulnerability could cause system crashes, knocking out sensors, medical equipment and more. A flaw in a widely used internet-of-things…yehey in darkweb • 3 years agoA New Bug in Microsoft Windows Could Let Hackers Easily Install a RootkitHow to Prevent Corporate Data Leaks in the Cloud Forget shadowy attackers deploying bespoke zero-day exploits from afar. A risk that is far more real for organizations as they embark on ambitious…yehey in cybersecurity • 3 years agoMafia Works Remotely, Too, It Seems: 100+ People Suspected of Phishing, SIM Swapping, Email Fraud CuffedDDoS Attack Service Admin Behind 200,000 Attacks Face 35 Years in Prison A federal jury in California, at the end of a nine-day trial, found an Illinois man guilty, who have operated several…yehey in malware • 3 years agoRomance Scammers Make $133m in First Half of 2021New Malware Uses Windows Subsystem for Linux for Stealthy Attacks Security researchers have discovered malicious Linux binaries created for the Windows Subsystem for Linux (WSL), indicating that…yehey in cybersecurity • 3 years agoBlackMatter ransomware hits medical technology giant OlympusCyber arms dealer exploits new iPhone software vulnerability A cyber surveillance company based in Israel developed a tool to break into Apple iPhones with a never-before-seen technique that has…