search external-link twitter facebook feed google-plus linkedin angle-left angle-right angle-up angle-down youtube-play
Ransomware

Sign up and stay up-to-date.

Blog /

High Profile Phishing Attacks in the News and How Automation Can Help

In the past two weeks, several high profile phishing attacks have highlighted how even the most security-conscious and sophisticated organizations on the planet can be susceptible to phishing. In this post, we’ll look at three types of phishing attacks and will show how security automation can help the process of investigating and remediating once an […]

Incident Response /

This Week in Cyber Security News – 10.7.16

Cybersecurity Trends and Opinion Incident Response A Challenge For 98% Of InfoSec Pros by Sara Peters Ninety-eight percent of IT security pros find incident response to be a challenge and 71% say it’s grown more difficult over the past two years, according to a new survey by Enterprise Strategy Group, sponsored by Hexadite. “It’s a […]

Ransomware /

Video: Stopping Ransomware in Minutes

Saying that ransomware can be devastating is the understatement of 2016. A few sobering statistics about ransomware: Nearly 50 percent of organizations have been hit with ransomware 42% of attacks impacted more than one endpoint $209 million was paid to ransomware criminals in Q1 2016, FBI estimates predict that to rise to over $1 billion […]

Blog /

Don’t Wave the White Flag: Practical Steps to Avoid and Stop Ransomware Before It’s Too Late – via InformationSecurityBuzz

Hexadite CTO and Co-Founder Idan Levin's article "Don’t Wave the White Flag: Practical Steps to Avoid and Stop Ransomware Before It’s Too Late" was just published on InformationSecurityBuzz.com.

Blog /

10 Tips for Companies to Avoid and Stop Ransomware – via eWeek

Hexadite CTO Idan Levin’s article “10 Tips for Companies to Avoid and Stop Ransomware” is now available on eWeek. From the article: Practically every day, there is a new report of companies, hospitals and schools being targeted and compromised by ransomware. Once infected–often after an employee downloads and installs a malicious application–files are encrypted and […]

Incident Response /

This Week in Cyber Security News – 3.28.16

  Malware and Ransomware Petya ransomware overwrites MBRs, locking users out of their computers By Lucian Constantin It’s hard enough for non-technical users to deal with ransomware infections: understanding public-key cryptography, connecting to the Tor anonymity network and paying with Bitcoin cryptocurrency. A new malicious program now makes it even more difficult by completely locking […]