Next-generation ransomware

Thumb original logrhythm next gen ransomware 2017.09.13

In recent years, ransomware has grown very quickly from relative obscurity to become one of the greatest cybersecurity risks facing organisations today.
Ransomware is not a new type of threat: it’s been around in its current form for over a decade. However, in the last few years, it has risen to prominence as an increasing number of variants were released into the wild – and several high-profile organisations fell victim to them. In the first half of 2017 in particular, the WannaCry and Petya/NotPetya outbreaks raised awareness of ransomware by causing damage to corporate systems that took some companies and parts of the public sector many months to recover from.

Organisations are now familiar with the threat ransomware poses, and are aware they need to protect their systems from emails and compromised sites that attempt to spread the malware, which can lock down systems and encrypt their files. But just because organisations are becoming more accustomed to dealing with ransomware, it doesn’t mean they can afford to take it any less seriously. Ransomware groups are now using a number of new strategies to catch organisations out.

View whitepaper
Date: 3 May 2018, 0:00 am   |   Provider: LogRhythm EMEA   |   Size: 2.05 MB   |   Language: English
This may interest you too:
Thumb original uk uws using mitre attack in threat hunting and detection white paper

Using MITRE ATT&CK™ in Threat Hunting and Detection

MITRE ATT&CK1 is an open framework and knowledge base of adversary tactics and techniques based on real-world observations. ATT&CK provides a common taxonomy of the tactical objectives of adversaries and their methods. Having a taxonomy by itself has many valuable uses, such as providing a common vocabulary for exchanging information with others in the security community. But it also serves as a real technical framework for classifying your current detection efforts and identifying gaps where you are blind to certain types of attack beh ...

To the download
Thumb original uk the security operations maturity model quick reference guide brochure

The Security Operations Maturity Model Quick Reference Guide

Organisations should think of security operations as a critical business process. Effective security operations are the first line of defence when it comes to preventing cyberattacks. To accomplish this, organisations need mature programs that leverage people, process and technology to rapidly detect and respond to sophisticated attacks.

Yet some organisations struggle with the overall effectiveness of their security operations. They also lack the basis for measuring the effectiveness and maturing capabilities. A mature security operation e ...

To the download
Thumb original 3 compelling reasons to consolidate on hci   en

Three Compelling Reasons to Consolidate on Hyperconverged Infrastructure

IT teams are under constant pressure to evolve their operations because traditional infrastructure - typically comprised of sprawling, siloed, and complex storage solutions - often can’t keep up with the pace of change that modern organizations demand.

IT must evolve to take advantage of technological advancements, such as hybrid cloud architectures and cloud-native applications, which offer more agility, resources and scale that result in faster time-to-market for digital products and services. If organizations fail to upgrade legacy infras ...

To the download
Thumb original it executive decision framework   from virtualization to multi cloud   en

IT Executive Decision Framework: From Virtualization to Multi-Cloud: 5 Stage Cloud Journey for Application and Cloud Modernization

Driven by the needs of applications, Digital Transformation is accelerating. IT decision-makers must guide their organizations through an evolution that continually aligns IT capabilities with the requirements of application modernization.

The needs of modern applications, and the migration and modernization of existing applications, means IT leaders must make a series of decisions as they transition to a cloud operating model, extending the data centre into one or more cloud environments.

This eBook provides a simple framework to help ...

To the download
Thumb original hyperconverge ms sql server to simplify app delivery   en

Hyperconverge Microsoft SQL Server to Simplify Application Delivery

Microsoft® SQL Server® 2016 delivers high performance–but storage-intensive workloads aren’t a good match for traditional infrastructure. From vendor and device restrictions to complicated management, running workloads on hardware alone is no longer practical.

To run SQL workloads efficiently, you need the low cost and high performance of hyperconverged infrastructure (HCI). In the Solution Overview, you’ll see how the market-leading all-flash HCI solution from VMware® vSAN™ enables radically simple storage that allows you to scale on dem ...

To the download