

Published | Cyber Defense Magazine Article | Wayback Archive As cybercriminals find new ways to improve their attacks, is there any hope of protecting our industrial networks from future attacks? Cybersecurity Predictions For 2021 As malicious actors become more clever in their tactics, we are also seeing an increase in supply chain attacks, complicating matters even further. Some of these attacks have an extortion goal in mind, while others seem to be nothing more than a test to see if the attacker is able to access and disrupt systems. Industrial control systems (ICS) have been the target of countless cyberattacks in recent years. Is There Hope for ICS and Supply Chain Security? Detonating Conti ransomware inside of a controlled environment tells us a lot about a modern ransomware attack, so that is exactly what I did.

Conti is a form of ransomware that has often targeted health care organizations and retailers, and perfectly demonstrates the basic behaviors exhibited by ransomware. While all those things are true, there are also some basic truths about ransomware attacks that can be used to stop an attack quickly, minimizing or eliminating the damage they cause. Ransomware attacks are perceived as complicated, confusing and dangerous. Published | Security Boulevard Article | Wayback Archive I Triggered a Ransomware Attack – Here’s What I Learned How it behaves can tell us a lot about a modern ransomware attack – so I recently detonated Conti ransomware in a controlled environment to demonstrate the importance of proper cyber protection. One such threat is Conti, which is often used to target healthcare organizations and retailers. Headlines of ransomware attacks seem to be a daily occurrence, announcing new levels of danger and confusion to the already complicated business of protecting data. Published | Bleeping Computer Article | Wayback Archive Detonating Ransomware on My Own Computer (Don’t Try This at Home) And while I wish my first Black Hat experience was in-person, with the global pandemic still raging, I am happy this year’s hybrid event enables me to attend at all. The prospect has me both excited and anxious. That finally changes for me this year as I’ll be joining Black Hat 2021 starting this weekend. Sure, I’ve attended DEF CON and some local cybersecurity conferences, but never one with a corporate focus. Having been in cybersecurity for nearly a decade, I’ve been aware of Black Hat, but haven’t had the opportunity to attend. Since 1997, Black Hat has been a staple in the world of cybersecurity conferences. Published | Acronis Article | Wayback Archive #BHUSA or bust: Hopes and expectations for Black Hat 2021 A great example of the evolution of malware is LockBit, which had already taken on some of the traits of Maze, but with LockBit 2.0 now also showing similarities to Ryuk and Egregor. This increase is coming as extortion gangs become more organized and learn from each other. While malicious emails remain a constant, we are seeing an increase in compromises of trusted software. It is no secret that ransomware attacks are on the rise, and attackers are finding new ways to access our systems. No user too small to target: A look at the new LockBit ransomware
MALWARE YEARS RUNONLY APPLESCRIPTS TO FOR FREE
These options include tools that range from built-in or free tools to paid solutions that will at least minimize the impact of an attack on your computers. You are still a target if you are vulnerable, and the chances of coming out of the situation without any data loss are minuscule. Of course, you can do things with a partial protection solution, even though you may not be able to stop the attack or save all of your files. Here’s the thing with relying on being insignificant enough to not be an obvious target: it doesn’t matter. This is clearly not the best option for anyone, so what can we do to make sure that we don’t become a victim in the first place? Recovering from a LockBit ransomware attack In most cases, a ransomware attack will mean completely restoring the computer to its factory settings and losing most or all of our data. While it is possible that someone who is prepared will not be significantly impacted by a ransomware attack, most of us will not be so lucky. Published | Adam Fowler IT Article | Wayback Archive Ransomware happens, be prepared: Preventing a LockBit attack The articles below were written by me, and published outside of my site.
