Stay updated with CyCraft’s latest technical articles.
The road to constructing an effective novel response against ransomware begins with understanding the recent trends of the underground ransomware ecosystem: common targets of ransomware, typical ransomware behavior, common ransomware encryption schemes, as well as the construction and application of decryptors and other effective response approaches and tools.
PK Tsung, Co-Founder & CSO of CyCraft Technology, spoke at SEMICON TAIWAN on the dangers of, and the solutions to, four common pain points targeting electronics manufacturing, design supply chain, and other SEMI member-related industries.
Following the announcement of CVE-2021–4228, CyCraft issued an emergency advisory to all CyCraft Customers outlining mitigation best practices. This advisory was updated as additional related vulnerabilities came to light.
In a year of threat landscape defining vulnerabilities (ProxyLogon, Log4j) and supply chain attacks with never before seen blast radiuses (SolarWinds, Kaseya), one threat has been consistently booming in the most recent years, dominating much of the cybersecurity dialog in both 2020 and 2021 — ransomware.
A Compromise Assessment (CA) is a comprehensive, automated, evidence-based analysis and evaluation of an organization’s entire digital environment and cybersecurity posture and is designed to identify all ongoing and past incidents of unauthorized access, malicious activity, and indicators of compromise.
Carrying on from our recent work on Prometheus Ransomware, we have new thoughts and intelligence to share on Conti Ransomware. However, considering the current climate and chatter across the global cyber landscape, we thought it best to also discuss how enterprises today should approach best practices regarding protection against ransomware.
We use cookies to ensure you get the best experience on our website. To learn more about cookies please view our privacy policy.