Latest News
Should Paying Ransomware be Illegal?
The Rising Ransomware Threat Fuels Debate on Payment Ban As cybercrime threat actors continue to rake in profits for attackers, the discussion surrounding a federal ban on ransom payments in the US is growing increasingly heated.
Read moreSecuring Your Strategy: Preparing for Ransomware Attacks and Payment Dilemmas
Would you be prepared to make a Ransomware Payment? Another year has passed, more Ransomware gangs have been taken offline by law enforcement, yet the anticipated decline in ransomware and double extortion attacks remains elusive.
Read moreHas BlackCat ransomware gang turned off its servers or has it been seized by Law Enforcement?
Blackcat Ransomware: Is it still active? The BlackCat/ALPHV ransomware gang has shut down its servers in the midst of an allegation from an affiliate that they were scammed by the ransomware gang.
Read moreLockBit Ransomware Operations Seized in ‘Operation Cronos’: What You Need to Know
A lot has happened in the last few days since the 19th February 2024, in the dark world of Ransomware gang activity.
Read moreUnmasking Ransomware: Origins, Types, and Notorious Attacks
Introduction: Ransomware, a malicious software that encrypts a victim’s files or entire computer system and demands payment for their release, has become a pervasive and formidable threat in the digital age.
Read moreRansomware Negotiation Tactics Evolve as Victims Seek Discounts and Threat Actors Try to Avoid Being Scammed.
The landscape of ransomware negotiation is undergoing significant evolution, as illustrated by a recent reported news story involving a European manufacturing company.
Read moreUnlocking Insights into Ransomware Negotiations: A Conversation with Richard Foster, Managing Director of Brainstorm Security
Richard Foster, the Managing Director of Brainstorm Security, has garnered attention as a top negotiator in ransomware cases.
Read moreWhat are the Pros and Cons of Ransomware Negotiation?
Navigating a ransomware attack is an incredibly stressful situation, and the decision to negotiate with the attackers is far from straightforward.
Read moreSocial Engineering: Emotions and Tactics
Here at Brainstorm Security, we use social engineering all the time to conduct physical penetration tests, phishing simulations, ransomware negotiations and even who’s turn it is to make the coffee!
Read moreUnlocking Security: The Case for Placing Ransomware Negotiation Services on Retainer
Introduction: In an era where cyber threats loom large, businesses face the ever-present risk of falling victim to ransomware attacks.
Read moreHow to negotiate with hackers, and win!
Have you planned for what will happen if you or your organisation is struck with a ransomware demand?
Read more