Beazley’s $45 Million Cybersecurity Bond: A Solution for First-Party & Third-Party Cyber Losses

Beazley, a leading specialist insurer, has recently launched a catastrophe bond for cybersecurity and ransomware breaches. This $45 million bond is designed to provide financial protection for organizations that suffer a significant cyber-attack resulting in a loss of $300 [...]

Beazley’s $45 Million Cybersecurity Bond: A Solution for First-Party & Third-Party Cyber Losses2023-01-19T14:08:36-08:00

Why Healthcare Entities Should Invest in Robust Cybersecurity

Healthcare organizations are under attack from all sides of their businesses. We are seeing a major increase in directed ransomware and other cyber-attacks on a variety of healthcare organizations and their partners. These attacks are crippling operations, while also [...]

Why Healthcare Entities Should Invest in Robust Cybersecurity2023-01-12T20:03:08-08:00

Why Ransomware Targets Education and Healthcare Sectors

Nowadays, tech and ransomware go hand in hand. Hackers look for two characteristics when they scope out their next target: first, an organization or individual with valuable information and assets; and second, someone who is fairly easy to attack. [...]

Why Ransomware Targets Education and Healthcare Sectors2022-12-16T17:41:34-08:00

U.S. Department of State’s $10M Bounty on Conti Ransomware

The U.S. Department of State announced last week that it is offering a $10,000,000 bounty for information on the identification or location of five highly ranked members of Wizard Spider, the Conti ransomware syndicate. Since the emergence of Conti in [...]

U.S. Department of State’s $10M Bounty on Conti Ransomware2022-12-15T00:57:47-08:00

The EPA Adds Cybersecurity Rules for Water Sector

As cyber attacks continue suppressing critical infrastructure sectors like water and wastewater systems, implementing proper cybersecurity practices is becoming more vital in protecting against highly disruptive cybersecurity incidents. According to the Environmental Protection Agency (EPA), these threats on process control [...]

The EPA Adds Cybersecurity Rules for Water Sector2022-12-15T00:58:31-08:00

Lack of Ransomware Reporting a Major Issue in Cybercrime Defense

For a country that boasts economic and technical progression, the United States falls short on ransomware proficiency. Malware groups and the mitigation of cyber attacks run rampant. Many organizations, as well as individuals, do not report these attacks because they [...]

Lack of Ransomware Reporting a Major Issue in Cybercrime Defense2022-08-08T22:45:03-07:00

SHI International Cyberattack

Over the Fourth of July weekend, prominent IT services provider SHI International, was a victim of a major malware attack. Based in Somerset, New Jersey, SHI is a private provider of tech services and a supplier of tech products to [...]

SHI International Cyberattack2022-07-21T20:08:04-07:00

AstraLocker 2.0 Ransomware is a Smash & Grab Variant

A version of AstraLocker, AstraLocker 2.0 ransomware, has just been released. This updated version is what some threat analysts call a rapid attack, or smash-and-grab style of ransomware. The AstraLocker 2.0 developers use Microsoft Word attachments in emails to distribute [...]

AstraLocker 2.0 Ransomware is a Smash & Grab Variant2022-12-15T01:00:38-08:00

LAPSUS$: The New Extortion Group Causing a Scene

A new threat actor group is behind an infamous wave of attacks impacting companies like Microsoft, Nvidia, Okta, and most recently Globant, among others. LAPSUS$, tracked as DEV-0537 by Microsoft, is relatively less sophisticated than other hacking and extortion groups [...]

LAPSUS$: The New Extortion Group Causing a Scene2022-04-08T17:40:39-07:00

Cybersecurity Transformations Since the Russia/Ukraine Conflict

In the past few days since the Russia/Ukraine conflict, there have been some changes in the cybersecurity landscape. Below are some of my personal observations from our Ransomware Recovery business unit. I am curious if other incident response professionals, ransomware [...]

Cybersecurity Transformations Since the Russia/Ukraine Conflict2022-03-04T12:27:57-08:00