Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Malware

Our Commitment to Security: Rubrik Attains Microsoft Teams Backup & Restore Certification

Today, I’m excited to announce that Rubrik has achieved the status of a certified Backup & Restore provider for Microsoft Teams. We’re thrilled to demonstrate proficiency and commitment to meet Microsoft customers’ evolving needs in today’s security-first, cloud-first world and a distinguishing mark within Microsoft’s partner ecosystem.

Should You Worry About Ransomware Attacks?

Over $800,000 - that’s the cost of the average ransomware payout last year. 66% of mid-sized organizations and about 37% of global organizations got hit. (Sources cited below) Attackers have developed new techniques that a lot of companies aren’t aware of or prepared for. For example, the demand for ransomware as a service has hugely increased, resulting in many more organizations being hacked every day.

How Hive becomes one of the most dangerous ransomware group

The Hive Gang is a Ransomware as a Service (RaaS) providers first identified in June 2021. Although relatively new, their aggressive tactics and ever evolving malware variants have made them one of the most successful RaaS groups of its kind. Find out how the group has risen through the ranks with their advanced ransomware kit, API based portal and negotiation services.

Rubrik and GraphQL - Episode 5 - Interfaces and Inline Fragments

During Episode 2 we gave a very brief introduction to how we form queries in GraphQL to retrieve relevant data from the Rubrik platform. This episode will dive a bit deeper into forming queries that utilize inline fragments to gather data from types that implement other types using interfaces. If you are hunting through the documentation and you think that certain information is missing, this video might be the solution to all your problems!

Ransomware in Healthcare: The NHS Example and What the Future Holds

On August 4, 2022, Advanced – a major software provider for the UK’s National Health System (NHS) and other healthcare customers – suffered a ransomware attack from a group that is still unknown to the public. The attack disrupted NHS services including ambulance dispatch, appointment bookings, patient referrals and emergency prescriptions.

The Anatomy of Wiper Malware, Part 2: Third-Party Drivers

In Part 1 of this four-part blog series examining wiper malware, we introduced the topic of wipers, reviewed their recent history and presented common adversary techniques that leverage wipers to destroy system data. In Part 2, CrowdStrike’s Endpoint Protection Content Research Team discusses how threat actors have used legitimate third-party drivers to bypass the visibility and detection capabilities of security mechanisms and solutions.

When prevention isn't better than cure

Learn to protect data from ransomware Explore real-life cybercrime examples Dive into the future of data security Learn to protect data from ransomware Register Now About half of CISOs say that their organisation is unprepared to cope with a coordinated attack. So they’re investing heavily to manage the risk. Deloitte reported that firms spend over 10% of their annual IT budget on cybersecurity. That works out at about $2-5 million per year for a typical enterprise.

Rubrik and GraphQL - Episode 4 - Powershell

Powershell is by far the most widely utilized SDK that Rubrik provides. While an SDK is currently under development to cover off everything Rubrik Security Cloud and GraphQL, this episode will show you how to make raw GraphQL API calls into the Rubrik platform using the infamous scripting tool. You will see how to form various queries and mutations within Powershell, and how to parse the returned responses - performing real-world automation scenarios with Powershell and Rubrik.

Introducing the Ransomware Content Browser

Splunk SURGe recently released a whitepaper, blog and video that outline the encryption speeds of 10 different ransomware families. The outcome of this research was that it is unlikely that a defender will be able to do anything once the encryption has started. Ransomware today is also mostly “human-operated” where many systems are sought out and compromised before any encryption activities occur and, once they do, the encryption is just too fast to meaningfully affect the damage done.