A majority of ransomware activity resulted from three leading groups. Beazley Security Labs also identified interesting trends with infostealers, including sophisticated techniques to deliver and obfuscate the malware, along with new entrants rising to fill demand.
Beazley Security has observed a number of tactics and targets related to this group that may help your company better protect itself against this new threat.
A trend involved using ransomware against VMware ESXi server hosts to affect as many systems in an environment as possible, even if they are virtual machines.
September 2022 was a bad month for ransomware. Times change but you need to stay vigilant.
Once an email account has been compromised, bad actors will go to town, often looking for ways to defraud a company's customers, partners, or employees.
Savvy threat actors know that the winter holidays mean that many organizations have fewer resources available to monitor their networks, creating opportunities for attack.
Network segmentation is a critical security measure for any network because it works on multiple levels to protect data and devices, as well as reduce and remove attack vectors.
AI content generation has dominated social media cycles recently. Ranging from a myriad of positive, helpful, and creative solutions of all sorts of tasks, to much more malicious purposes.
Email Spoofing is a technique involving sending emails with a fake sender address, stealing the identity of a real user that is typically trusted in the eyes of the victim.
The trend toward working remotely has been increasing for the past 20 years, spiking in the years since Covid initially hit. This has changed the workplace, and changed cyber security practices.
Phishing attacks have long been a cyber security challenge for organizations; today, they are responsible for more than 80% of reported security incidents.
Small and medium-sized businesses have a unique challenge when it comes to cyber security. Unlike large corporations and government agencies that typically have formal information security teams working full time to prevent and manage cyber threats, these smaller companies rarely have the resources to systematically address their ongoing security needs.
Let’s get the acronym out of the way so we are all on the same page – Multi-Factor Authentication (MFA). As a part of an overall Identity and Access Management (IAM) program, MFA can play an important role in managing access and protecting key assets.