Living Off the Land: How Ransomware Groups Weaponize Legitimate Tools
Explore how ransomware groups like LockBit and Vice Society employ 'living off the land' tactics, exploiting legitimate tools to bypass detection. Learn their techniques and effective strategies to mitigate these evolving cyberthreats.
TAG Blog Series 2 – How ADX is Integrated into the Enterprise
Integrating Anti Data Exfiltration (ADX) solutions into an enterprise is crucial for effective cybersecurity. This article examines how BlackFog's commercial ADX solution enhances existing detection and response technologies by focusing on prevention and the shift-left paradigm. Using ransomware threats as an example, we illustrate how ADX mitigates device risks in typical business environments. Additionally, we explore how ADX supports the evolving needs of modern managed security service providers, ensuring comprehensive and proactive security measures.
Manufacturing Industry Faces Surge in Ransomware Attacks in 2024
Ransomware attacks on the manufacturing industry are rising, with notable cases at MKS Instruments, Brunswick Corporation, Simpson Manufacturing, and The Clorox Company. Learn about the financial and operational impacts and why manufacturers are prime targets for cybercriminals.
Enterprise Ransomware Protection: Why it Matters
Why must enterprise ransomware protection be a critical component of any firm's cyber security strategy?
TAG Blog Series 1 – How ADX Supports and Implements Policy
Implementing Anti Data Exfiltration (ADX) solutions is critical for enterprise security. This article provides guidance on establishing effective ADX deployment policies, with a focus on aligning them with business objectives and threat perceptions. Highlighting BlackFog's ADX solution, it explores proactive strategies to prevent data exfiltration, offering valuable insights for practitioners aiming to enhance their security posture.
5 Steps to Ensure Your Enterprise Data Security
Why do enterprise data security strategies need to evolve to cope with a new range of threats?
Ransomware Recovery: Key Steps Every Firm Should Know
What should businesses keep in mind in order to develop an effective ransomware recovery plan?
Doubleface Takes Down the Website of Donetsk International Airport
Doubleface ransomware, developed in C/C++, utilizes AES-128 and RSA-4096 encryption techniques. It remains undetected and includes anti-analysis features. Explore its key attributes, cost implications, and relevance in cybersecurity.
Dark Angels Received a Huge $75m Ransom Payment, Who Are They?
In early 2024, a Fortune 50 company paid the Dark Angels ransomware group a record $75 million ransom. Learn about Dark Angels' background, major attacks, and the technical details behind their biggest ransomware payment in history.