Ransomware has become one of the most dangerous threats for organizations worldwide. Cybercriminal organizations and ransomware gangs have devised new business models that are attracting a broad range of advanced threat actors. It is quite easy today for cybercrime groups to launch a cyber attack benefitting from the Ransomware-as-a-Service model causing damages of any size.
The ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACKS report aims to bring new insights into the reality of ransomware incidents through mapping and studying ransomware incidents from May 2021 to June 2022. The findings are worrisome.
Ransomware operations continue to evolve and are becoming more efficient and causing more devastating attacks. The double-extortion model could expose the most private information of targeted entities on the Internet to the highest bidder.
The main highlights of the ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACKS report include the following:
Another important aspect to consider when dealing with this threat is that the number of publicly disclosed incidents is just the tip of the iceberg.
The report includes recommendations to increase resilience against ransomware attacks and respond to this threat, enjoy it!
https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, ENISA)
[adrotate banner=”5″]
[adrotate banner=”13″]
ConnectWise detected suspicious activity linked to a nation-state actor, impacting a small number of its…
Victoria’s Secret took its website offline after a cyberattack, with experts warning of rising threats…
Google says China-linked group APT41 controlled malware via Google Calendar to target governments through a…
GreyNoise researchers warn of a new AyySSHush botnet compromised over 9,000 ASUS routers, adding a…
The Czech government condemned China after linking cyber espionage group APT31 to a cyberattack on…
PumaBot targets Linux IoT devices, using SSH brute-force attacks to steal credentials, spread malware, and…
This website uses cookies.