Home Search
ransomware rudra - search results
If you're not happy with the results, please do another search
This is How Ransomware Gangs Select their Victims
Not all ransomware gangs break into targeted networks. They often purchase access to victims’ networks from other cybercriminal groups and initial access brokers (IABs)...
FBI Raises Red Alert About Hive Ransomware Group
Authorities from the FBI are warning about a new ransomware group, tracked as Hive, which was behind the recent attacks on multiple health care...
New Ransomware LockFile Targets Victims with Intermittent Encryption Technique
A new ransomware variant has been making the rounds in the cyberthreat landscape. Security experts from Sophos uncovered new ransomware dubbed LockFile targeting victims...
Rags to Riches! The Evolution of Ransomware Operators
Detecting and preventing ransomware attacks have become the primary goal for most organizations. The cybersecurity community across the globe is severely concerned about the...
Ransomware Attacks in 2020! These are 4 Most Affected Sectors
From a local food retailer to a multi-national company, ransomware attacks continue to loom over cyberspace. Ransomware operators target victims by encrypting their sensitive...
7 Times Ransomware Became a Major Healthcare Hazard
By Rudra Srinivas
Cyber-attacks on healthcare organizations has become a trend in the last few years. With sensitive information of their patients with them, healthcare...
How Cybercriminals Exploit QR Codes to Their Advantage
Since the outbreak of the COVID-19 pandemic, there has been a dramatic change in consumer technology across the globe. Quick-Response (QR code) technology was...
Log4j Explained: How It Is Exploited and How to Fix It
Log4j or Log4Shell, a critical vulnerability in the widely used Apache Log4j Library, has raised alarms and security concerns across the tech and info...
4 Types of Insiders You Need to Know
Despite several employee awareness programs and cybersecurity best practices, most organizations face insider threats that affect the overall security posture. Threat actors continue to...
How to Prevent Credential Abuse Attacks?
Strong login credentials are treated as the first defense against unauthorized intrusions. However, they also become a gateway for cybercriminals to penetrate critical network...