Attacks

  • Attacks

Lumu’s Ransomware Incident Response Playbook

Reading Time: 2 mins There’s a lot of information available about ransomware, but most of what exists focuses on how…

1 year ago
  • Attacks

Compromise Flashcard 2022: The Disparate Realities of Cybersecurity

Reading Time: 4 mins Lumu’s Compromise Flashcard 2022 tells the story of compromise in 2022. Learn how threat actors are…

2 years ago
  • Attacks

Cybercrime in the Education Sector

Reading Time: 3 mins Cybercrime in the education sector is having a field day while educational institutions are suffering at…

2 years ago
  • Attacks

Conti Ransomware Group: the Alliances Behind the Chaos

Reading Time: 4 mins The Conti Ransomware Group has recently unleashed a series of attacks on nations including Costa Rica,…

2 years ago
  • Attacks

Ransomware Flashcard 2022: The Vicious Cycle

Reading Time: 3 mins Trends from 2021 indicate that 2022 will see an increased threat of ransomware on a global…

2 years ago
  • Attacks

Log4j: What You Need to Know

Reading Time: 2 mins The Log4j vulnerability (designated as CVE-2021-44228 by MITRE) affects 1000's of software applications. Here are some…

2 years ago
  • Attacks

Recognize the First Signs of a Ransomware Chain

Reading Time: 5 mins Ransomware is always preceded by signs that can be identified and stopped. Learn about ransomware chains…

2 years ago
  • Attacks

Monetization of Cybercrime: It’s All About the Money

Reading Time: 2 mins The monetization of cybercrime has diversified while deep web credential market activity has been accelerating. Here's…

3 years ago
  • Attacks

Critical Infrastructure Ransomware Attacks Escalate

Reading Time: 4 mins The Colonial Pipeline cyberattack highlights the dangers of critical infrastructure ransomware attacks. Here are some takeaways…

3 years ago
  • Attacks

Lessons from (Another) Florida Ransomware Attack

Reading Time: 4 mins The $40 million attack on the Broward County public school district is an example of how…

3 years ago