Tag: Resources

Responding to Ransomware: A Q&A with David Shear of Vigilante

Responding to Ransomware: A Q&A with David Shear of Vigilante

It’s not enough to acknowledge the threat of ransomware—companies need to be positioned to communicate with threat actors (whether directly or indirectly), contain damage and minimize business interruption associated with this increasingly common form of cyberattack. I talked to David Shear, threat data governance and integration manager of Vigilante, about best practices in preparation and response to ransomware events. Read…

Read more

More Groups Following Maze Team Ransomware Model

More Groups Following Maze Team Ransomware Model

Vigilante wishes to highlight two more ransomware groups that have adopted the Maze Team model of extorting their victims to pay: NetWalker and Ako. Under the Maze model, once the group has the victim’s data in its possession, it demands two separate ransoms; the first ransom amount is for providing a decryption key and the second is to delete all the data they copied and exfiltrated before locking up the victims’ files.

Read more