Estimated reading time: 5 minutes
New targeted ransomware called SNAKE or EKANS was found in early January. Malware is written in the Go language and it is heavily obfuscated and goes after ICS environments. Snake Ransomware seems to be distributed via a focused and...Estimated reading time: 3 minutes
Last year we saw two high-profile ransomware attacks strike within a few weeks of each other, affecting more than a quarter million machines worldwide and causing major disruptions. With the adoption of the Eurocard/Mastercard/Visa payment standard increasing, credit card...Estimated reading time: 3 minutes
Since WannaCry swept the world in 2017, ransomware has become a network administrator’s worst nightmare. It’s not without any reason: the devastating WannaCry ransomware attack affected more than 200,000 computers across 150 countries with huge damages. Other notable ransomware attacks...Estimated reading time: 3 minutes
Ransomware threats have long been plaguing the online space and are usually considered to be extremely disruptive in nature. Unlike other malware threats which keep a low profile, ransomware attacks announce themselves before crippling a system for diverse benefits....Estimated reading time: 3 minutes
A comprehensive IT Asset Management (ITAM) program facilitates an accurate, documented IT environment covering the organization’s assets and data along with their owners and highlighting security and risks across the network. It helps to make critical decisions regarding software...