Top Ransomware Threats Of 2023

In this post we will list the top 5 ransomware strains of 2023. Lockbit AlpVM CLOP Royal BlackBasta Now that 2024 has started, the Lockbit ransomware strain is still at…

Read more

Mysterious Threat Actor Targeting Space Telescopes

Work at the Gemini North Telescope in Hawaii and Gemini South Telescope in Chile, had to halt operations due to a cyber attack. These attacks also disrupted a number of…

Read more

FAQ – What Is The Lifecycle Of A Ransomware Incident?

It is important to understand the various stages of a ransomware attack. This is key to knowing how one can defend against them. In this Netsurion video it shows us…

Read more

FAQ – What Is An Effective Defence Against Ransomware Attacks?

Sadly there is no one size fits all solution that will protect you against ransomware attacks. Using a proactive and layered approach to security will limit the chance of a…

Read more

FAQ – Who Carries Out Ransomware Attacks?

Ransomware attacks are carried out by threat actors. They used to be classified into two types of threat actors - Criminal Gang - State Sponsored Group There is now a…

Read more

FAQ – What Policies Are Used When Responding To Ransomware?

There are various frames of thought when it comes to responding to a ransomware attack. One approach is to refuse to pay the ransom, whereas others might be up for…

Read more

FAQ – How Is Ransomware Categorized?

There are a plethora of ransomware packages available for those that have malicious intent as well as those that want to search for them. Ransomware can be mainly broken down…

Read more
Types of Ransomware

FAQ – What Are The Types Of Ransomware?

It is important to understand the various stages of a ransomware attack. Knowing these different stages will allow you to have a better of understanding how to defend against them.…

Read more
FAQ – Why Has Ransomware Become So Popular

FAQ – Why Has Ransomware Become So Popular?

Ransomware has been around for over 3 decades. Only now though has it become majorly widespread as a form of cybercrime. Roughly 1/4 of all malware incidents are caused by…

Read more
Part 3 De Anonymizing Domains on the Dark Web – Favicon matching

Part 3 De-Anonymizing Domains on the Dark Web – Favicon matching

Favicon Matching The second method that is used to uncover a dark web based website on the surface internet (clear internet) is the process of "favicon matching". A favicon is…

Read more