Search

Money is Fueling the Cyber Pandemic

The cybersecurity industry has abandoned prevention in favor of reaction
because this strategy maximizes their revenue

Ransomware Incident News & Updates

Conti Ransomware Attacks

An alert has been issued by the FBI and CISA (Cybersecurity and Infrastructure Security Agency) regarding Conti ransomware. "In typical Conti ransomware attacks, malicious cyber actors steal files, encrypt servers and workstations, and demand a ransom payment." Conti bad threat actors gain access to a network through spearphishing, smishing and vishing campaigns. They use malicious email attachments and links, fake phone calls, software promotions, stolen Remote Desktop Protocol (RDP) credentials, and other system vulnerabilities.

Ransomware Cybersecurity

FamousSparrow APT Hacker Group

FamousSparrow, classified as an advanced persistent threat (APT) group, is a new hacking gang that targets government agencies, engineering companies, legal firms, and other organizations.

BlackMatter Agricultural Ransomware Attack

BlackMatter ransomware gang's attack on an Iowa grain and feed cooperative could lead to food shortages. The ransomware group is demanding $5.9 million from the agricultual cooperative which will go to $11.8 million if not paid within 5 days.

Phishing-as-a-Service Group

Microsoft has discovered what can be classified as a Phishing-as-a-Service (PHaaS) group, dubbed - BulletProofLink, BulletProftLink, and Anthrax. The group offers phishing email services including hosting and email management to cyber-gangs.

Application Whitelisting by PC Matic Available in Australia

As ransomware attacks surge globally, Australians are choosing PC Matic's application whitelisting to proactively stop ransomware. PC Matic announced technical and sales support for its business product line, PC Matic Pro and PC Matic MSP, during Australian business hours. "Our mission is to protect the world from ransomware, and Australians understand that application whitelisting is a critical element in any security stack to proactively stop ransomware," said Rob Cheng, CEO and Founder of PC Matic.

Ransomware Cybersecurity

CISA Releases Remote Access Guidance to Federal Agencies

CISA has released Trusted Internet Connections 3.0 Remote User Use Case guidance for goverment agencies. The Remote User Use Case provides federal agency users with guidance on how to apply network and multi-boundary security for agencies that allow remote users on their networks. Recent guidance also includes cybersecurity awareness with regards to ransomware attacks, network defense practices and best practices to prevent cyber-threats. Federal Agency Ransomware Protection.

The President Signs K-12 Cybersecurity Act Into Law

Last week, the President signed the bipartisan K-12 Cybersecurity Act of 2021 into law to provide school districts with IT security resources to combat threats and protect themselves against cyberattacks including ransomware.

Ransomware Cybersecurity

Ransomware in the Media

Media Attention

"Each year increased money and attention are devoted to cybersecurity, but ransomware continues to accelerate in the wrong direction. Despite national media coverage, ransomware attacks very rarely ever result in coverage that reveals the failed solutions that led to the infections. Why is that?"

Learn More
Ransomware Prevention and Cybersecurity

Prevention

"Lost in the entire conversation is cyber prevention. Why is that? By focusing strictly on reaction, rather than prevention, the cybersecurity industry maximizes revenue at the expense of their customers. Prevention is practical, economical, and normally not newsworthy. With reaction, however, there is money to be made for the cybersecurity experts who clean up after a ransomware attack, so for many in the industry an incentive exists to allow them to continue."

Read Why Hackers are Winning

Ransomware Warnings

"As the developer of the first global whitelist, Rob Cheng is an American pioneer in cybersecurity. Our federal, state, and local governments would be in much better shape today, from a cyber defense perspective, if we had listened to him early on."

Van Hipp
Chairman of American Defense International, Inc.
Former Deputy Assistant Secretary of the United States Army

"Ransomware is now daily news and its victims are large technically sophisticated organizations, and critical elements of the cybersecurity industry. What is happening?"

Scott Augenbaum
30 year Cyber FBI Veteran, Author of "The Secret to Cybersecurity"
Cybercrime Keynote Speaker on the "Lack of Prevention in Cybersecurity"
Retired FBI Supervisory Special Agent, Cyber Division

Ransomware is Out of Control

Ransomware is getting past some of the most well-known antivirus software products and doing its dirty work for hackers and cybercriminals including some nation states. Which antivirus products or security products are failing to stop these cyber-attacks? A lack of transparency in the industry almost ensures that this vital information is not made public. Consequently, security holes and vulnerabilities are left unresolved resulting in more ransomware attacks. Other unsuspecting ransom victims are then hit, further fueling the security industry's expensive cycle of recovery efforts, and profits for the ransomware industry.

"The ransomware industry has blossomed into a high growth, high margin business extracting millions of dollars daily from its victims under the cloak of anonymity that have left law enforcement helpless. There is little barrier to entry to making ransomware. Rather than focusing on perpetrators, more attention should focus on the security holes through which the ransomware enters."

Finally, there is a ransomware solution - Read How to Stop Ransomware

Cyber-Prevention is the Missing Piece

"For every ransomware infection, there is a failed antivirus that allowed the ransomware on the network. Why is the public not informed which products are failing, and why they fail? Without ransomware prevention tools in place antivirus software alone is not enough to block threats."

Discover the 3 Pillars of Prevention

  1. Cybersecurity Training
  2. Multifactor Authentication
  3. Application Whitelisting
Explore the best ways to implement the 3 pillars of ransomware prevention.

Application Whitelisting Tools vs Blacklisting Antivirus Software

Unlike blacklisting antivirus software products, Application Whitelisting solutions only allow known, good programs to run on your computer, mobile device, server or network. With whitelisting, any unknown or untested new programs can't run, preventing malicious ransomware from running. This effectively blocks hacker's attempts to encrypt your files or lock your system.

PC Matic is the leading producer of automated Application Whitelisting solutions and security software in the USA. Our security solutions protect enterprise and small business, industry, schools, hospitals, local and federal government IT systems and networks.

Read more about Application Whitelisting Cybersecurity

Ransomware Decryption vs Ransomware Prevention

Using Ransomware Decryption Tools vs Ransomware Prevention Tools. Many victims of a ransomware malware attack are searching for recovery and decryption tools when it would be much less stressful and less expensive to simply use a ransomware prevention tool like application whitelisting. Use of whitelist technology for access and application control is part of the NIST recommended cybersecurity protocols.

With whitelisting tools, IT administrators could prevent a server or network data breach to begin with and avoid the remediation and recovery process.

Modern whitelisting technology is cloud-based and very easy to maintain. Visit ransomware protection software for the best anti-ransomware on the market, and explore how application whitelisting solutions work to protect you, your data and your business.