Industry Insights

Ransomware Is Not a “Malware Problem” – It’s a Criminal Business Model

Ransomware Is Not a “Malware Problem” – It’s a Criminal Business Model

posted by: on May 10, 2016 5:00 AM

filed in: Threat Prevention, Unit 42
tagged:

Today Unit 42 published our latest paper on ransomware, which has quickly become one of the greatest cyberthreats facing organizations around the world. As a business model, ransomware has proven to be highly effective in generating revenue for cybercriminals in addition to causing significant operational impact to affected organizations. It is largely victim agnostic, spanning the globe and affecting all major industry verticals. Small organizations, large enterprises, individual home users – all are potential targets.

New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer

posted by: and on March 6, 2016 11:30 AM
Unit 42, Palo Alto Networks

On March 4, we detected that the Transmission BitTorrent client installer for OS X was infected with ransomware, just a few hours after installers were initially posted. We have named this Ransomware “KeRanger.” The only previous ransomware for OS X we are aware of is FileCoder, discovered by Kaspersky Lab in 2014. As FileCoder was incomplete at the time of its discovery, we believe KeRanger is the first fully functional ransomware seen on the OS X platform.

Metadata: What You May Have Missed

Metadata: What You May Have Missed

The Internet of Things: Advanced Threats Against Medical Devices

The Internet of Things: Advanced Threats Against Medical Devices
Author: Fran Howarth

ShoreTel Mobility Pro Tips: 5 Things to Make Mobility Work Better for You

ShoreTel Mobility Pro Tips: 5 Things to Make Mobility Work Better for You
By: Clinton Fitch, Practice Manager of Advanced Applications - EMEA

‘DHL’ SMS Spam Distributes Android Malware in Germany

‘DHL’ SMS Spam Distributes Android Malware in Germany
By on Jul 31, 2014

Check out our favorite free sysadmin tools that we use to help us work faster and be more awesome.

Check out our favorite free sysadmin tools that we use to help us work faster and be more awesome.
by Rob Sobers

Technology nerds take over Hot Stove Society….is Tom Douglas in trouble?

Technology nerds take over Hot Stove Society….is Tom Douglas in trouble?
by Kara Marsh

5 Things Privacy Experts Want You to Know About Wearables

5 Things Privacy Experts Want You to Know About Wearables
Posted by:

Seahawks’ Stadium Scores Big With Major Tech Upgrade [Video]

Seahawks’ Stadium Scores Big With Major Tech Upgrade [Video]

by Rob Roache

Metadata Era: What you may have missed

Metadata Era: What you may have missed
Posted by:

Securing the Cloud

Securing the Cloud

Robert ClauffJuly 10, 2014 - Posted by Robert Clauff to Security Insight

A Botnet Worth Geeking Out Over

A Botnet Worth Geeking Out Over
by Michael Perna  |  July 09, 2014

Say Hello to Lifesize Cloud

Say Hello to Lifesize Cloud

Cloud VoIP Phone Systems

Cloud VoIP Phone Systems

The Expanding Data Universe

The Expanding Data Universe

by Cindy Ng

Social Engineering: A Successful Method of Attack

Social Engineering
A Successful Method of Attack
Posted by Jeremy Scott

GameOver ZeuS Media Coverage and Update

GameOver ZeuS Media Coverage and Update
by Chad Kahl

The Growing Menace of Internal Threats

The Growing Menace of Internal Threats

Protect Privacy to Better Manage Risk

Protect Privacy to Better Manage Risk
Author:

3 Challenges for the National Patient-Centered Clinical Research Network (PCORnet)

3 Challenges for the National Patient-Centered Clinical Research Network (PCORnet)

Posted by:

Why The Internet Of Things Is Quick Moving From Big Idea To Big Deal

Why The Internet Of Things Is Quickly Moving From Big Idea To Big Deal

The Other Stories Behind the DoJ’s Indictment

The Other Stories Behind the DoJ’s Indictment

NCA Awarded Certificate of Environmental Accomplishment

NCA Awarded Certificate of Environmental Accomplishment

Looking into the Crystal Ball – What’s Next for Cybercrime?

 Looking into the Crystal Ball – What’s Next for Cybercrime?

Jason RaderAuthor:
Jason is the Director of Cyber Threat Intelligence for RSA

ShoreTel Service Alert - Open SSL Heartbleed Bug- May 2, 2014

ShoreTel Service Alert - Open SSL Heartbleed Bug

Rethinking the CIO: From IT Leader to Business Leader

Rethinking the CIO: From IT Leader to Business Leader

by Rob Roache

Security Awareness Metrics - Measuring Change in Human Behavior

Security Awareness Metrics - Measuring Change in Human Behavior

Metadata: What you may have missed

Metadata: What you may have missed
Posted by:

Why Creative Crowdsourcing Is Good For Business

Why Creative Crowdsourcing Is Good For Business

ShoreTel Service Alert - Open SSL Heartbleed Bug

ShoreTel Service Alert - Open SSL Heartbleed Bug

Subject: OpenSSL Heartbleed Bug

Date: April 10, 2014

The Heartbleed Bug

The Heartbleed Bug

Addressing Data Security and Management in the Public Sector

Addressing Data Security and Management in the Public Sector

Webinar: Thurs, March 27 - 11:00 am PST

Top 10 SXSW IT Talks for Business Leaders

Top 10 SXSW IT Talks for Business Leaders
by Richard G. Twilley

5 Ways UTM Security Can Help Schools

5 Ways UTM Security Can Help Schools
Posted by WatchGuard Team

Malevolent Marketplaces

Malevolent Marketplaces
By Michael Buckbee

An Impassioned Perspective

An Impassioned Perspective

By: Bob Griffin

McAfee Cyber Defense Center Zooms In on Middle East

McAfee Cyber Defense Center Zooms In on Middle East

By

More Phishing and Metadata Connections

More Phishing and Metadata Connections
By Andy Green

More Articles ...