September 19 2024
Living Off the Land: How Ransomware Groups Weaponize Legitimate Tools
Explore how ransomware groups like LockBit and Vice Society employ 'living off the land' tactics, exploiting legitimate tools to bypass detection. Learn their techniques and effective strategies to mitigate these evolving cyberthreats.
September 16 2024
TAG Blog Series 2 – How ADX is Integrated into the Enterprise
Integrating Anti Data Exfiltration (ADX) solutions into an enterprise is crucial for effective cybersecurity. This article examines how BlackFog's commercial ADX solution enhances existing detection and response technologies by focusing on prevention and the shift-left paradigm. Using ransomware threats as an example, we illustrate how ADX mitigates device risks in typical business environments. Additionally, we explore how ADX supports the evolving needs of modern managed security service providers, ensuring comprehensive and proactive security measures.
September 2 2024
TAG Blog Series 1 – How ADX Supports and Implements Policy
Implementing Anti Data Exfiltration (ADX) solutions is critical for enterprise security. This article provides guidance on establishing effective ADX deployment policies, with a focus on aligning them with business objectives and threat perceptions. Highlighting BlackFog's ADX solution, it explores proactive strategies to prevent data exfiltration, offering valuable insights for practitioners aiming to enhance their security posture.
August 23 2024
Doubleface Takes Down the Website of Donetsk International Airport
Doubleface ransomware, developed in C/C++, utilizes AES-128 and RSA-4096 encryption techniques. It remains undetected and includes anti-analysis features. Explore its key attributes, cost implications, and relevance in cybersecurity.
August 20 2024
Dark Angels Received a Huge $75m Ransom Payment, Who Are They?
In early 2024, a Fortune 50 company paid the Dark Angels ransomware group a record $75 million ransom. Learn about Dark Angels' background, major attacks, and the technical details behind their biggest ransomware payment in history.
August 2 2024
How Can You Make Your Data Security Management as Effective as Possible?
What do firms need to know to ensure they have the strongest data security management measures in place?
November 28 2023
EU Whistleblower Act: Organizations Must Protect Whistleblowers
With the new EU whistleblower act, organizations that fail to protect whistleblowers may face fines and suffer data leaks.
October 5 2023
How Machine Learning is Vital in Successful Data Exfiltration Detection
Why should a data exfiltration detection solution play a key role in your firm's cybersecurity strategy?
August 14 2023
The Data Exfiltration Techniques You Need to be Aware of
What data exfiltration techniques are being used to target businesses with threats such as ransomware in 2023?
August 1 2023
Why do Businesses Need Advanced Enterprise DLP Solutions?
What protections do enterprise DLP tools provide and why should firms be looking beyond legacy solutions to defend against data loss?