Ransomware

Ransomware: How to Detect Attacks Before They Become Catastrophic

Register for our free webinar to gain crucial insight from seasoned experts on ransomware anatomy, warning signs, proactive defense strategy, and swift incident response technique. Don’t risk your data and digital security!

Reducing Ransomware Risk in Healthcare

Editor’s Note: This a partnered sponsored guest blog written by Avertium. How much are you willing to pay to get your personal data back? How about hundreds and thousands of personal data records stored in your company? The impacts of…

Cyber Warfare: The New Frontline

In this webinar, Sally Vincent, LogRhythm senior threat research engineer, dives deep into the state of cyber warfare, exploring risk evaluation and how the White House directives can assist operations. Join Sally as she showcases how LogRhythm can help you turn threat reports into detections for your benefit.

Three Steps to Translate Threat Reports into Actionable Items Using MITRE ATT&CK®

Threat Hunting Framework: Three Steps to Translate Threat Reports into Actionable Steps

Thanks to Sally Vincent and Dan Kaiser from the LogRhythm Labs team for developing the process and guiding content described in this post. Threat research can be an invaluable asset to security teams when attempting to formulate a proactive stance…

Baltimore County Schools Forced to Cancel Classes Following Ransomware Attack

Baltimore County Schools Forced to Cancel Classes Following Ransomware Attack

James Carder, CSO at LogRhythm, noted that school districts continue to be a top target for ransomware attacks, especially during a holiday week when many let their guards down. “As we have witnessed over the past few months, threat actors are still at large — implementing ransomware attacks to gain control of vital data and bring organizations to their knees,” Carder said.

Software AG targeted by double extortion ransomware attack, LogRhythm commentsSoftware AG targeted by double extortion ransomware attack, LogRhythm comments

Software AG Targeted By Double Extortion Ransomware Attack, LogRhythm Comments

“Double extortion ransomware attacks, such as this incident with Software AG, are extremely concerning as they serve the dual purpose of making ransomware more damaging for victims and more lucrative for criminals,” Andrew Hollister, head of LogRythm labs, comments.

Softening the impact of ransomware attacks

Softening the Impact of Ransomware Attacks

Ransomware attacks have long been a top cybersecurity concern for organizations in every sector, not just public education. James Carder, CSO at LogRhythm, recommended six steps that organizations at all levels of government can take to harden their IT systems.

Remote learning invites UK university cyberattack, LogRhythm comments

Remote Learning Invites UK University Cyberattack, LogRhythm Comments

“As we continue to normalise remote learning, cybercriminals are simultaneously finetuning their tactics to launch timely, sophisticated ransomware, phishing and social engineering attacks,” Andrew Hollister, head of LogRhythm labs, comments. “The severe and far-reaching impact of May’s Blackbaud ransomware attack is…