Blog Featured Conti University: Four Lessons in Defense from a Ransomware Gang’s Playbook The leak of a playbook used by the Conti ransomware gang is a gift to red- and blue teams everywhere.
Blog Congress Needs To Get Over Corporate Ransom Payments The question of whether- and when to pay a ransom is a distraction for lawmakers. A better question: how to increase the accountability of both criminal gangs and their victims.
Blog Some Tips For Talking To Your Board About Ransomware The plague of successful attacks means ransomware is no longer the threat that “shall not be named” in the Boardroom. Here’s what to tell your Board of Directors when they ask.
Blog What We Know About The Kaseya Ransomware Attack The REvil ransomware gang has reportedly compromised Kaseya, whose software is used by managed service providers. Here’s what we know...
Blog As Ransoms Mount: How To Keep Your Organization Safe Recent news accounts of multi-million dollar payments to ransomware gangs underscore the financial and reputation risk of ransomware to your organization. To keep your organization safe, QOMPLX says focusing on identities and privileges is key.
Blog A Lesson From The Pipeline Hack: Secure Active Directory Now The Darkside ransomware attack on Colonial Pipeline looks like an escalation, but it is just business as usual for Human-Operated ransomware groups. Defenders should take note!
Blog Law Firms Feeling Pinch of Accellion Breach Jones Day was among the law firms breached in an attack on Accellion’s file transfer application. It highlights the need for closer monitoring by firms of their software supply chains.
Blog Netfilim and Ransomware’s Long Fuse A report on a Netfilim ransomware outbreak highlights the long fuse that these attacks have. Basic security hygiene - especially for Active Directory - can snuff them out.
Blog FBI Warns Hospitals on Ryuk Ransomware Credential Theft and Malicious DNS Organizations face an uphill battle in detecting and responding to the sophisticated, human-directed ransomware campaigns. Getting a grip on credential theft and monitoring DNS traffic are key.