(A preview of the soon-to-be released SC Media eBook “Endpoint security: Critical in the fight against ransomware.”)Endpoints with low visibility and a high potential for user interactions may be more vulnerable to ransomware threats, and are easy targets for threat actors. Unpatched devices, outdated software, weak passwords, and poor configuration of endpoint protection tools are as exploitable as they are preventable.
By putting these recommendations into action, organizations can get ahead of the next ransomware attack. If you’re struggling to check all the boxes, consider getting help from an MDR service. MDR vendors combine elite threat hunting experts, advanced endpoint scanning tools, rapid incident response, and contextual threat intelligence to help organizations proactively address their endpoint vulnerabilities.
An In-Depth Guide to Ransomware
Get essential knowledge and practical strategies to protect your organization from ransomware attacks.
Daniel Thomas is a technology writer, researcher, and content producer for CyberRisk Alliance. He has over a decade of experience writing on the most critical topics of interest for the cybersecurity community, including cloud computing, artificial intelligence and machine learning, data analytics, threat hunting, automation, IAM, and digital security policies. He previously served as a senior editor for Defense News, and as the director of research for GovExec News in Washington, D.C..
Massachusetts teen Matthew Lane has admitted guilt over his involvement in the massive attack against online education software provider PowerSchool in December, according to NBC News.
BleepingComputer reports that the newly emergent VanHelsing ransomware-as-a-service operation has released its affiliate panel, data leak site, and Windows encryptor source codes after "th30c0der", one of its old developers, attempted to peddle such data for $10,000.