When was the last time you had a serious conversation about cybersecurity that didn’t touch on ransomware? We all know that it’s one of the most persistent and damaging threats out there. Yet, this isn’t because it’s new (ransomware’s been around since 1989), but because we are making it far too easy for threat actors. This...Read More
It seems like barely a week goes by without a new cyberattack that affects health care providers. Often, it’s a ransomware attack conducted by foreign criminal gangs, which are provided safe harbor by hostile nation states, that targets a mission critical third-party service provider or supplier, like the attack on UnitedHealth Group’s Change Healthcare or...Read More
PUBLISHED : 13 May 2025 at 07:41 Small Medium Large AVM Amorn says the development of cybersecurity personnel is very important because cyber threats are increasingly sophisticated in every sector. Successful Thai holders of the Certified Information Systems Security Professional (CISSP) exam now total 431, up from 385 in 2024, reflecting the...Read More
Darren Thomson at Commvault One of the greatest challenges in combating ransomware is that, while new security tools and practices continue to emerge, threat actors are simultaneously advancing their tactics and becoming increasingly sophisticated. Ransomware and data theft extortion continue to be pervasive threats with business email compromise and fraud among the...Read More
We all know that it’s one of the most persistent and damaging threats out there. Yet, this isn’t because it’s new (ransomware’s been around since 1989), but because we are making it far too easy for threat actors. This year at RSA Conference, I gave a talk on why ransomware is still a thing in...Read More
Beneath the surface of the second-floor lab in UC Santa Barbara’s Harold Frank Hall, a pod of sharp minds is moving toward a $4 million prize and the expansion of artificial intelligence (AI). Shellphish, UCSB’s elite hacking team, has plunged deep into a two-year competition, the Artificial Intelligence Cyber Challenge (AIxCC) sponsored by the Defense...Read More
Ransomware relies on strong encryption to lock victims out of their data – but not all ransomware encrypts files the same way. In this technical deep dive, we showcase our analysis team’s findings on how six major ransomware families implement encryption. This post outlines how ransomware uses symmetric and asymmetric cryptography, presents typical encryption workflows,...Read More
Ransomware is a serious problem in its current state, and it’s about to get worse. All your security programs and measures will be rendered useless when ransomware comes for your CPU. Ransomware Can Lock Your CPU Ransomware generally locks system files and other documents inside your OS and renders your PC practically unusable. CPU ransomware,...Read More