By Ian Thomas
on April 29, 2022
Higher education institutions are prime targets for ransomware attacks. Universities and colleges handle large amounts of sensitive personal data, facilitate a campus-wide intranet, and manage ...
By Ian Thomas
on April 01, 2022
The ongoing conflict between Russia and Ukraine poses cyber threats that extend beyond Ukraine’s borders across the entire EMEA region. Cyber attacks are a significant part of Russia’s military ...
By Themis
on February 25, 2022
Being prepared for the latest email security and phishing threats requires anticipating what’s on the horizon over the next year or so. Part one of this series of predictions covered the possible ...
By Ian Thomas
on February 02, 2022
International law enforcement collaboration led to the disbandment of several high-profile ransomware gangs in the last 12 months. As ransomware attacks gained more media coverage and wreaked more ...
By Ian Thomas
on January 27, 2022
Ransomware attacks continue to be a problem for companies around the world. As these attacks surge, many high-profile incidents have made headlines across Africa. This article highlights some of the ...
By Ian Thomas
on January 25, 2022
FIN7 is a unique group in the shady world of cybercrime. Infamous for sophisticated stolen credit and debit card hacks involving phishing emails and other social engineering methods, the gang’s ...
By Ian Thomas
on January 18, 2022
Netwalker is a notorious name on the ransomware scene with a prolific record of successful attacks. An estimated $25 million in ransom extortions between March and September 2020 established the gang ...
By Ian Thomas
on December 10, 2021
Ragnarok is a ransomware gang known for the Ragnar Locker ransomware, which has impacted a range of high-profile organizations from video game developers to energy companies. This article looks at ...
By Ian Thomas
on December 03, 2021
Babuk is a new ransomware gang that emerged in early 2021. The gang’s initial mission statement referenced a non-malicious intent to conduct ransomware attacks as an apparent audit of the security of ...
Shapes-Left

Join thousands of your peers! Subscribe to our blog.

Ironscales needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

Shapes-Right