Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Malware

Rubrik Leads the Way in Cyber Resilience: Ranked Highest for Ransomware Protection, Detection, and Recovery by Gartner

We are thrilled to announce that Rubrik has been ranked highest for the ransomware protection, detection, and recovery use case in the 2024 Gartner Critical Capabilities for Enterprise Backup and Recovery Software Solutions1. This recognition underscores our unwavering commitment to innovation that empowers customers with robust cyber resilience solutions in an increasingly complex digital landscape.

Infostealers: An Early Indicator of Ransomware Attacks

Cybersecurity experts are beginning to notice a recurring pattern: many companies that fall victim to ransomware attacks first experience infections from infostealers. These malicious tools are designed to siphon sensitive information from systems, but they might also serve as an early warning for defenders, providing the opportunity to act before a full-scale ransomware attack occurs.
Featured Post

Data Resilience and Protection in the Ransomware Age

Data is the currency of every business today, but it is under significant threat. As companies rapidly collect and store data, it is driving a need to adopt multi-cloud solutions to store and protect it. At the same time, ransomware attacks are increasing in frequency and sophistication. This is supported by Rapid7's Ransomware Radar Report 2024 which states, "The first half of 2024 has witnessed a substantial evolution in the ransomware ecosystem, underscoring significant shifts in attack methodologies, victimology, and cybercriminal tactics."

Securing Digital Health: Cybersecurity Challenges in Rapid Healthcare Transformation #shorts

The healthcare industry, traditionally slow in digital transformation due to stringent regulations, is now experiencing rapid change. As digitization accelerates, vast amounts of personal and professional data are being stored across healthcare systems—making them prime targets for cybercriminals. This sector’s rich data environment, coupled with evolving cybersecurity practices, creates a unique challenge. Unlike the well-established security measures in banking and financial services, healthcare's cyber defenses are still maturing.

North Korean Hackers Target Software Developers With Phony Coding Tests

Researchers at ReversingLabs warn that North Korea’s Lazarus Group is targeting software developers with phony job interviews. The threat actors are posing as employees of major financial services firms and send coding assessment tests as part of the interview process. Our team recently recorded a webinar that covers this exact topic, as our cybersecurity experts discuss how we spotted the red flags and stopped it before any damage was done.

Measuring Your Data's Risk Exposure with Bipul Sinha, CEO, Chairman, and Co-Founder of Rubrik

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.

Embracing Resilience in Cybersecurity: Preparing for Recovery and Thriving Post-Attack #shorts

In cybersecurity, the real challenge isn’t just preventing attacks; it's about how you rebound and continue delivering your digital products and services when an attack hits. The crucial focus must be on preparedness and resilience, not just avoidance. It's natural to want to ignore the possibility of a breach—our minds prefer to focus on positive scenarios. But effective planning requires embracing the pessimistic side of our intellect.

ALPHV BlackCat Ransomware: A Technical Deep Dive and Mitigation Strategies

ALPHV, also known as BlackCat or Noberus, is a sophisticated ransomware group targeting critical infrastructure and various organizations, including being the most active group used to attack the financial services sector. ALPHV first appeared in November 2021 and operates on a Ransomware-as-a-Service (RaaS) model, allowing affiliates to use its malware for their own attacks in exchange for a cut of the ransom payments.

How To Detect and Remove a Keylogger

You can detect a keylogger if you notice unfamiliar apps on your device, slower performance speeds, a lag in mouse movements or strange background noises on phone calls. A keylogger is a type of malware that requires an entry point, such as an email or cloud program, to be installed on your device. Once it is on your device, a cybercriminal can monitor every keystroke you make to learn your login credentials and private information.

New Ransomware Threat Group, RansomHub, is so Effective, the NSA is Already Warning You About Them

The latest evolution of the ransomware service model, RansomHub, has only been around since February of this year, but its affiliates are already successfully exfiltrating data. You know you’re a problem when the U.S. government puts out a notice about you. That’s the case for RansomHub — the latest iteration of a ransomware as a service group formerly working under the names Cyclops and Knight.