Lockbit leak, research opportunities on tools leaked from TAs

In September of 2022, multiple security news professionals wrote about and confirmed the leakage of a builder for Lockbit 3 ransomware. In this post we provide the analysis of the builder and recently discovered builds. Continue reading Lockbit leak, research opportunities on tools leaked from TAs

One simple way to cut ransomware recovery costs in half

Whichever way you look at the data, it is considerably cheaper to use backups to recover from a ransomware attack than to pay the ransom. The median recovery cost for those that use backups is half the cost incurred by those that paid the ransom, according to a recent study. Similarly, the mean recovery cost […]

The post One simple way to cut ransomware recovery costs in half appeared first on Security Intelligence.

Continue reading One simple way to cut ransomware recovery costs in half

One simple way to cut ransomware recovery costs in half

Whichever way you look at the data, it is considerably cheaper to use backups to recover from a ransomware attack than to pay the ransom. The median recovery cost for those that use backups is half the cost incurred by those that paid the ransom, according to a recent study. Similarly, the mean recovery cost […]

The post One simple way to cut ransomware recovery costs in half appeared first on Security Intelligence.

Continue reading One simple way to cut ransomware recovery costs in half

Why Data Security is the Unsung Hero Driving Business Performance

In the digital economy, data is like oxygen — giving life to innovation. And just as important, data security establishes the trust needed for that data to deliver value. In fact, organizations with the most advanced security capabilities delivered 43% higher revenue growth than peers over a five-year period, according to research from the IBM […]

The post Why Data Security is the Unsung Hero Driving Business Performance appeared first on Security Intelligence.

Continue reading Why Data Security is the Unsung Hero Driving Business Performance

BlackCat (ALPHV) Ransomware Levels Up for Stealth, Speed and Exfiltration

  This blog was made possible through contributions from Kat Metrick, Kevin Henson, Agnes Ramos-Beauchamp, Thanassis Diogos, and Diego Matos Martins. BlackCat ransomware, which was among the top ransomware families observed by IBM Security X-Force in 2022, according to the 2023 X-Force Threat Intelligence Index, continues to wreak havoc across organizations globally this year. BlackCat (a.k.a. […]

The post BlackCat (ALPHV) Ransomware Levels Up for Stealth, Speed and Exfiltration appeared first on Security Intelligence.

Continue reading BlackCat (ALPHV) Ransomware Levels Up for Stealth, Speed and Exfiltration

The Importance of Modern-Day Data Security Platforms

Data is the backbone of businesses and companies everywhere. Data can range from intellectual property to critical business plans to personal health information or even money itself. At the end of the day, businesses are looking to grow revenue, innovate, and operationalize but to do that, they must ensure that they leverage their data first […]

The post The Importance of Modern-Day Data Security Platforms appeared first on Security Intelligence.

Continue reading The Importance of Modern-Day Data Security Platforms

How Breached Companies Become the Face of Change

I’ve always told my kids that everyone makes mistakes. What really matters is how you handle them and that you learn from what happened.  SolarWinds followed the same thinking in how it handled its 2020 breach. Not only did the company write its comeback story to help improve its reputation, but it is also working […]

The post How Breached Companies Become the Face of Change appeared first on Security Intelligence.

Continue reading How Breached Companies Become the Face of Change

Getting Lost in an Encryption Maze? Try a Key Management System

Encryption is an essential part of any data security strategy. A key management system (KMS) can make encryption easier by enabling you to transform data to indecipherable cyphertext and control who can access it in clear text. That helps keep data secure from unauthorized use, alteration, exfiltration or deletion. While encryption is a great tool […]

The post Getting Lost in an Encryption Maze? Try a Key Management System appeared first on Security Intelligence.

Continue reading Getting Lost in an Encryption Maze? Try a Key Management System

Luna and Black Basta — new ransomware for Windows, Linux and ESXi

This report discusses new ransomware, that targets Windows, Linux and ESXi systems: Luna written in Rust and Black Basta. Continue reading Luna and Black Basta — new ransomware for Windows, Linux and ESXi