Manage Digital Risk
Address Critical Business Needs
How RSA NetWitness Platform® Protects against Ransomware Attacks
RSA NetWitness Platform can identify and prevent ransomware attacks. Learn how.
Read more
Healthcare in the Age of Ransomware
It’s time to address the rise of ransomware in the healthcare industry.
How Ransomware uses TMP files and the Temp folder
In my previous blog, Why Malware Installers Use TMP files and the Temp folder, I discussed the advantages malware can have by using atomic writes instead of simply copying the malware to the intended location. In this blog, I discuss how ransomware uses the same technique for its purpose and how it is different from...
Ransomware: The New Cyber Kryptonite
And then, there was irony. While Apple has been able to hold out against the FBI demanding it produce a backdoor into the iPhone used in the recent San Bernardino attack, it was unable to render a similar defense against a strain of ransomware that recently, albeit briefly, infected its own Mac computers. The recent...
The Era of Proportional Ransomware Has Arrived
According to the FBI the incursion of ransomware has just gone from bad to worse. In a recent alert, the U.S. Federal Bureau of Investigation (FBI) warned that recent ransomware variants have targeted and compromised vulnerable business servers to identify and target hosts, thereby multiplying the number of potential infected servers and devices on a network. More...
The Criminal Appeal of Advanced Ransomware: How Can Companies Protect Their Files?
Advanced ransomware—malicious software designed to take control of a computer system and hold it hostage until the victims pay for its release—is one of the fastest-growing areas of cybercrime. Another closely related threat is cyberextortion, where attackers threaten to cause harm to a company by releasing sensitive information to the public or sustaining...
Managing Risk Amid Spike in Ransomware Attacks on Critical Infrastructure
Ransomware attacks are a new wrinkle in managing your risk.
Is Municipal Ransomware Something to Lose Sleep Over?
Disruptions facing municipal IT can't distract from cyberattack risks.
Ransomware Rules for Payment: Do Extortionists Have the Advantage?
When an entire health system fell prey to cybercriminals and medical records were locked up by a ransomware attack in early February, there seemed no choice but to pay the sum demanded in order to avoid the impact on patient care: $17,000 in 40 Bitcoin. And in that single moment, one hospital became the obligatory...
Detecting "Petya/NotPetya" with RSA NetWitness Endpoint and RSA NetWitness Packets
By Alex Cox, Christopher Elisan and Erik Heuser, RSA Research A Ransomware variant known as “Petya/NotPetya” began making the rounds on June 27, 2017. This ransomware takes a different approach to denying access to the victim’s files. Instead of the usual displaying of a message and letting the victim browse to really see that the...
Blog posts by category
Around RSA
Industry Perspectives
Products & Solutions
Securing the Digital World
The Language of Cybersecurity
Need help? Click on the button below to begin a chat session.