
Bindu Sundaresan
Director feature_status*/ ?>
AT&T Cybersecurity
Comments Dotted :
6
January 13, 2021
C-level executives similar to the Business Email Compromise type of an attack.
Cybercriminals are more sophisticated than ever, and while the primary purpose of ransomware groups is to make money, there is always a high risk of collateral damage, since attacks stop systems from working. Ransomware groups design their cyberattacks to cause enough disruption and financial distress to not just disrupt file access, but also to reach critical business operations, where harm will be immediately and acutely felt, to justify their plea for quick and high payment. This new tactic
.....Read More
October 29, 2020
These attacks are essentially a combination of a ransomware attack and a data breach.
Ransomware attack patterns have evolved significantly. Traditionally, ransomware was deployed to encrypt the victim’s data and lock them out of their own files. Had the victim refused to pay the ransom, their files would be destroyed. Ransomware attacks today have evolved to double extortion. Usually, the attacker would exfiltrate a copy of the data before encrypting them. This way, the attacker not only prevents the victim from accessing their data but also keeps a copy of the data for.....Read More

September 30, 2020
These attacks are essentially a combination of a ransomware attack and a data breach.
If Universal Health Services has been targeted by Ryuk ransomware, it is worth noting how this ransomware has crippled both the public and private sectors. It is known for targeting enterprise organizations with the intention of demanding higher payments for the decryption key. Code comparison between versions of Ryuk and Hermes ransomware indicates that Ryuk was derived from the Hermes source code and has been under steady development since its release. A commodity malware, Hermes has been.....Read More

March 27, 2020
Cybersecurity threats to these organisations are real, especially in the wake of a global pandemic.
We think the Covid-19 dynamics are creating more opportunity for malicious actors to target telemedicine and healthcare organisations as a whole. Cybersecurity threats to these organisations are real, especially in the wake of a global pandemic. Healthcare organisations are scrambling to expand their remote system access and management while adequately protecting sensitive information from malicious actors. It is expected that we will see more highly publicised ransomware attacks on hospitals,.....Read More

September 25, 2019
Two-way verification helps companies to solve the problem of this type of financial fraud by implementing a company-wide policy.
We continue to see such attacks against businesses whereby emails are sent to trick recipients into sending money or other details. This is a prevalent form of Business Email Compromise and these threats are highly targeted and rely on social engineering rather than malware, meaning that such “Imposter Emails” often evade security solutions that look only for malicious content or behavior.
Technology alone cannot offer effective protection. One of the key measures is raising security.....Read More

September 04, 2019
Over recent years, hackers have evolved phishing attacks to mimic original brands.
Over recent years, hackers have evolved phishing attacks to mimic original brands or reputable websites to evade detection and, unfortunately, they are proving successful. Ultimately, they are targeted at an individual user so appropriate training and awareness is vital to remind users to remain vigilant to unsolicited or unexpected emails which ask for credentials, payment, or any other action that seems out of the ordinary.
