Ransomware attackers demanded dramatically higher ransom fees last year, and the average ransom payment rose by 78% to 541,010, according to data from incident response (IR) cases investigated by Palo Alto Networks Unit 42. IR cases by Unit 42 also saw a whopping 144% increase in ransom demands, to $2.2 million. According to the report,…

Shortly after Russia launched its invasion of Ukraine, the notorious Conti ransomware group issued a statement warning that it was prepared to hit the critical infrastructure of Russia’s enemies in retaliation for potential attacks on Russia. In response, an anonymous individual set up a Twitter account named “Conti Leaks” and started releasing files allegedly stolen…

Titaniam, Inc., the industry’s most advanced data protection and cyber immunity platform, today announced its full product offering, the Titaniam Suite. These enhancements and the full set of products give Titaniam an edge as they push back on the larger ransomware problem happening ubiquitously across every industry. Ransomware and extortion-based cyber attacks occur at the…

Catalogic Software announced a new partnership with Backblaze to offer ransomware protection for enterprise and Kubernetes backups. Catalogic’s enterprise data protection software, DPX, provides robust backup and recovery capabilities and integrates seamlessly with Backblaze B2 Cloud Storage to provide a secure, fast, and infinitely scalable backup target. CloudCasa by Catalogic now supports Backblaze B2 as…

On February 27, an individual with insights into the Conti ransomware group started leaking a treasure trove of data beginning with internal chat messages. Conti is responsible for a number of high profile attacks, including one against the Irish Healthcare system which has cost more than $48 million and more importantly has had an unprecedented…

Our researchers analyzed the HermeticRansom malware also known as Elections GoRansom. By and large, this is a fairly simple cryptor. What is interesting in this case is the purpose for which attackers are using it. HermeticRansom goals HermeticRansom attacked computers at the same time as another malware known as HermeticWiper, and based on publicly available…

Available as a Ransomware-as-a-Service (RaaS), BlackByte has been used in attacks against US and foreign businesses, including in critical infrastructure sectors such as government, financial, and food and agriculture, the FBI and USSS warn. BlackByte operators recently claimed to have obtained financial data from the San Francisco 49ers as a result of an attack that…

You might have the luxury of time when planning for a vacation, but cybersecurity teams do not have the time to hunt in the wrong haystack when responding to security incidents. Every second matters in the wake of an intrusion detection, as threat actors move quickly from the first breach point to various other points…