RansomHub threat actors observed using EDR-killing tool

RansomHub threat actors observed using EDR-killing tool

Threat research from Sophos details a recent encounter with the ransomware group known as RansomHub. The research reports that the attack was unsuccessful; however, researchers were able to analyze the attack and discovered the use of an EDR-killing tool. The research has labelled this utility the EDRKillShifter.  John Bambenek, President at Bambenek Consulting, comments, “At present, only RansomHub is using the tool. However, as it was sold on the dark web, it is more than likely that…

Read More

Microsoft Says VMware ESXi Flaw is Being Exploited By Ransomware Groups

Microsoft Says VMware ESXi Flaw is Being Exploited By Ransomware Groups

A vulnerability in the ESXi hypervisor was patched by VMware last week, but Microsoft has revealed that it has already been exploited by ransomware groups to gain administrative permissions. VMware ESXi is a bare-metal hypervisor that enables the creation and management of virtual machines directly on server hardware, which may include critical servers. CVE-2024-37085 is an authentication bypass vulnerability that allows malicious actors with sufficient permissions to gain full access to a domain-joined ESXi host….

Read More

Australian Organisations Experiencing Highest Rate of Data Breaches, Reports Rubrik

Australian Organisations Experiencing Highest Rate of Data Breaches, Reports Rubrik

Australian organisations have reported the highest rate of data breaches compared with global markets in 2023, according to a new survey. However, they were less likely than their global peers to experience a “significant” cyber attack. Australia’s quicker adoption of technologies, including cloud computing, is part of the story, according to backup and recovery firm Rubrik. The company has urged Australian organisations to review their backups to improve cyber resilience. Approximately 8 in 10 Australian…

Read More

Ransomware Attacks Are Attracting Record Payouts in Australia. Should You Pay the Ransom?

Ransomware Attacks Are Attracting Record Payouts in Australia. Should You Pay the Ransom?

Ransomware remains one of the most common forms of cyber attack — and it’s particularly threatening because it can be incredibly effective. Globally, ransomware damage costs are predicted to exceed $265 billion by 2031. These attacks can affect even the largest of organisations. In July, a hacking group disrupted more than 230 of Indonesia’s government agencies and services by infecting critical systems at a national data centre. Why organisations are tempted to pay ransoms Theoretically,…

Read More

Cyber Security Public-Private Partnerships Are Taking Off in APAC

Cyber Security Public-Private Partnerships Are Taking Off in APAC

APAC governments are partnering more closely with private-sector organisations and cyber security tech providers as part of public-private partnership style arrangements. These collaborations can include threat intelligence sharing, cyber capacity building, research and joint investigations. As the cyber threat continues to grow in APAC, including from ransomware attackers and nation-state actors, the hope is that integrated collaboration between governments and businesses will lead to a more cohesive response. What is a cyber security public-private partnership?…

Read More

Locking out ransomware: A new way to look at security strategy

Locking out ransomware: A new way to look at security strategy

Ransomware attacks are accelerating at a record pace, becoming dramatically more frequent and more sophisticated. In fact, nearly 60% of companies experienced ransomware events in the last year, forcing desperate businesses to cough up a staggering $1 billion in ransom payments. That’s up from the $220 million that was paid to bad actors in 2019. Change Healthcare is just one recent example. The company was hit with one of the largest ransomware attacks within healthcare,…

Read More

Cisco Talos: Top Ransomware TTPs Exposed

Cisco Talos: Top Ransomware TTPs Exposed

Cisco Talos analyzed the top 14 ransomware groups between 2023 and 2024 to expose their attack chain and highlight interesting Tactics,Techniques and Protocols. The security company also exposed the most leveraged vulnerabilities being triggered by ransomware actors. Ransomware attack chain: What Cisco Talos researchers learned Ransomware actors nearly all use the same attack chain. Typical ransomware attack chain. Image: Cisco Talos Step one for ransomware actors The first step for the threat actor consists of…

Read More

Dragos: Industrial Cyber Security Basics Can Help Protect APAC OT Operators

Dragos: Industrial Cyber Security Basics Can Help Protect APAC OT Operators

Industrial cyber security in APAC is still lagging behind enterprises, but having some basic hygiene and a plan in place is “light years” better than nothing, according to director of incident response at operational technology cyber security firm Dragos Lesley Carhart. Carhart recommends industrial technology operators large or small in APAC realise they could all be targets, including from state actors looking to steal information or position themselves for a future geopolitical event, and to…

Read More

Cyber Insurance Premiums Are Declining, Howden Insurance Brokers Report Finds

Cyber Insurance Premiums Are Declining, Howden Insurance Brokers Report Finds

Improved cyber hygiene among businesses has led to a reduction in cyber insurance premiums by 15% worldwide over the last two years, a new report from Howden Insurance Brokers has found. This is despite the fact that cyberthreats, particularly ransomware attacks, are becoming more prevalent. Awareness of cyber hygiene practices, like multifactor authentication, EDR and cloud backups, has grown significantly since 2022. Ransomware attacks have increased by 18% this year, according to Howden and NCC…

Read More

Ransomware Cheat Sheet for 2024: What Is Ransomware?

Ransomware Cheat Sheet for 2024: What Is Ransomware?

Ransomware is arguably the most high-profile security threat of the moment. Cybercriminals across the world are demanding money from victims by holding their devices and data hostage. This type of attack, in which data is encrypted or claimed to be and victims are prompted to pay for the key to restore access, has been growing rapidly since 2013 and is now one of the most common types of malware. TechRepublic’s cheat sheet about ransomware is…

Read More
1 2 3 4 5 42