How to Defeat Ransomware with ThreatOps

centripetal-ransomware-blog-2

Over the last few years, we’ve seen quite an uptick around a host of new cyberthreat intelligence (CTI) solutions promising to help combat the steady rise in ransomware attacks. If you’re not familiar with them, CTI solutions were designed to collect publicly available cyberthreat data from across the globe that they could package and sell […]

Ransomware Surges in Popularity

centripetal-ransomware-blog-1

You might have noticed that ransomware attacks have seen a surge in popularity recently that most say will likely continue for some time. It’s not that ransomware attacks are new; the first documented ransomware attack was the AIDS trojan back in 1989. It’s just that they’ve become much easier for thieves to monetize with a […]

Preventing Ransomware with Intelligence

centripetal-preventing-ransomware

Recently several high-profile ransomware incidents have affected the country, these include Colonial Pipeline, JBS, and FujiFilm. These attacks do not occur in a vacuum and use known Indicators of Compromise (IOCs) previously published in Cyber Threat Intelligence (CTI). Centripetal’s massive library of CTI contained these indicators for months before the ransomware attacks occurred and can be […]

Ransomware on the Rise

centripetal-ransomware-rise

The use of ransomware is a disturbing trend on the rise among cyber hackers. Ransomware is sent to a company, or to an individual user, through an email phishing method. This email method has recently been successful in tricking unsuspecting individuals to open emails that appear trustworthy but are not. Once the email is opened, the […]