Microsoft Exchange exploits – step one in ransomware chain

Microsoft Exchange exploits – step one in ransomware chain

Once attackers gain a foothold on web servers, there are all manner of nasty tricks and malware they can leverage immediately or put into play later – like ransomware.Since the research blogpost – Exchange servers under siege from at least 10 APT groups – ESET has...
Ransomware in a virtual environment

Ransomware in a virtual environment

Several cybercriminal groups have exploited vulnerabilities in VMware ESXi to infect computers with ransomware. Although it significantly reduces some cyberthreat risks, virtualization is no more a panacea than any single other practice. A ransomware attack can still...
Incident Response Steps in Web Application Security

Incident Response Steps in Web Application Security

Just when news reports about individual data breaches were starting to get predictable, we got SolarWinds. And then Accellion. And Exchange Server. In a world where the next cybersecurity incident is only a matter of time, having a solid web incident response plan is...