Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
Expanding Attack Blueprints: 2022 Annual Cybersecurity Report
Cyber Threats

Expanding Attack Blueprints: 2022 Annual Cybersecurity Report

In this blog entry, we shine a spotlight on some of the most critical cybersecurity concerns of 2022, which we discuss in full in our annual cybersecurity report, “Rethinking Tactics: 2022 Annual Security Report.”

March 07, 2023
Cyber Threats

S4x23 Review Part 3: Healthcare Cybersecurity Sessions

This article focuses on the healthcare sector. Over the past two years, the healthcare sector has been in a constant state of emergency due to the COVID-19 pandemic, and as widely reported in the media, it has also been threatened by cyberattacks such as ransomware.

Security Strategies Mar 20, 2023

Save to Folio

Security Strategies Mar 20, 2023

Save to Folio

Compliance & Risks

S4x23 Review Part 2: Evolving Energy Cybersecurity

In this second report on S4x23 held last February, this article introduces the discussion on cyber security in the energy industry, which was one of the topics that attracted attention.

Security Strategies Mar 13, 2023

Save to Folio

Security Strategies Mar 13, 2023

Save to Folio

Malware

Emotet Returns, Now Adopts Binary Padding for Evasion

Following a three-month hiatus, Emotet spam activities resumed in March 2023, when a botnet known as Epoch 4 began delivering malicious documents embedded in Zip files that were attached to the emails.

Research Mar 13, 2023

Save to Folio

Research Mar 13, 2023

Save to Folio

Ransomware

Examining Ransomware Payments From a Data-Science Lens

In this entry, we discuss case studies that demonstrated how data-science techniques were applied in our investigation of ransomware groups' ransom transactions, as detailed in our joint research with Waratah Analytics, “What Decision-Makers Need to Know About Ransomware Risk.”

Research Mar 09, 2023

Save to Folio

Research Mar 09, 2023

Save to Folio

Cyber Threats

Expanding Attack Blueprints: 2022 Annual Cybersecurity Report

In this blog entry, we shine a spotlight on some of the most critical cybersecurity concerns of 2022, which we discuss in full in our annual cybersecurity report, “Rethinking Tactics: 2022 Annual Security Report.”

Reports Mar 07, 2023

Save to Folio

Reports Mar 07, 2023

Save to Folio

Cyber Threats

S4x23 Review Part 1: What's New in OT Security

This blog introduces discussions from S4x23, the ICS security conference in Miami over several posts. The first instalment will cover two topics from the academic interviews.

Security Strategies Mar 03, 2023

Save to Folio

Security Strategies Mar 03, 2023

Save to Folio

Ransomware

Leveraging Data Science to Minimise the Blast Radius of Ransomware Attacks

In this blog entry, we present a case study that illustrates how data-science techniques can be used to gain valuable insights about ransomware groups' targeting patterns as detailed in our research paper, “What Decision-Makers Need to Know About Ransomware Risk.”

Research Mar 02, 2023

Save to Folio

Research Mar 02, 2023

Save to Folio

APT & Targeted Attacks

Iron Tiger’s SysUpdate Reappears, Adds Linux Targeting

We detail the update that advanced persistent threat (APT) group Iron Tiger made on the custom malware family SysUpdate. In this version, we also found components that enable the malware to compromise Linux systems.

Mar 01, 2023

Save to Folio

Mar 01, 2023

Save to Folio