ransomware

Automated Patch Management: Achieving the vision of tomorrow, today!

Patch management of the future is automated, fire-and-forget, and risk-based. You can achieve this vision of tomorrow, today! Strong patch compliance is the first line of defense in the war against ransomware. More than 50% of ransomware attacks are the result of poor patch compliance due to end user’s blocking patches. Look, your techs and […]

Automated Patch Management: Achieving the vision of tomorrow, today! Read More »

Automated Patch Management: Achieving the vision of tomorrow, today!

Patch management of the future is automated, fire-and-forget, and risk-based. You can achieve this vision of tomorrow, today! Strong patch compliance is the first line of defense in the war against ransomware. More than 50% of ransomware attacks are the result of poor patch compliance due to end user’s blocking patches. Look, your techs and

Automated Patch Management: Achieving the vision of tomorrow, today! Read More »

2022 Vulnerability Intelligence Report

Security, IT, and other teams tasked with vulnerability management and risk reduction operate in high-urgency, high-stakes environments where informed decision-making hinges on the ability to quickly find signal in a sea of perpetual noise. When a new potential threat emerges, information security professionals often find themselves needing to translate vague descriptions and untested research artifacts

2022 Vulnerability Intelligence Report Read More »

CyberSecMY 2023

In the past year, the global business sector has experienced an extraordinary level of cyberattacks, which has created challenges for security teams to respond promptly. A significant number of vulnerabilities were identified, and malicious actors are still exploiting many of them in the current year. With Malaysia’s growing dependence on technology and digital infrastructure, ensuring

CyberSecMY 2023 Read More »

ICS/OT Cybersecurity Year in Review 2022

2022 Key Findings Overview 2022 saw a breakthrough escalation in capabilities by a new modular industrial control systems (ICS) malware, PIPEDREAM, developed by the threat group, CHERNOVITE. CHERNOVITE’S PIPEDREAM toolkit has the capabilities to impact tens of thousands industrial devices that control critical infrastructure – devices that manage the electrical grid, oil and gas pipelines,

ICS/OT Cybersecurity Year in Review 2022 Read More »

Threat Report, T3 2022

Welcome to the T3 2022 issue of the ESET Threat Report! In 2022, an unprovoked and unjustified attack on Ukraine shocked the world, bringing devastating effects on the country and its population. The war continues to impact everything from energy prices and inflation to cyberspace, which ESET researchers and analysts have monitored extensively throughout the

Threat Report, T3 2022 Read More »

The Near and Far Future of Ransomware Business Models

This research paper explores the position of ransomware in cybercrime and what would trigger changes in ransomware business models. Ransomware has evolved into a malware used to cause major problems for enterprises, governments, healthcare, and critical infrastructure, but other cybercriminal business models — ones that can generate significantly more illicit profit — raises an interesting

The Near and Far Future of Ransomware Business Models Read More »