Sign in
  • News
  • Interviews
  • 2021: The Comeback Year
  • Articles
  • Insights
    • Guest Post
    • Use Cases
    • Events
  • Quick Bytes
  • RESOURCES
Sign in
Welcome!Log into your account
Forgot your password?
Privacy Policy
Password recovery
Recover your password
Search
Wednesday, April 14, 2021
  • Sign in / Join
Sign in
Welcome! Log into your account
Forgot your password? Get help
Privacy Policy
Password recovery
Recover your password
A password will be e-mailed to you.
ITSECURITYWIRE FAVCON ITSECURITYWIRE FAVCON ITSecurityWire
  • News
  • Interviews
  • 2021: The Comeback Year
  • Articles
  • Insights
    • Guest Post
    • Use Cases
    • Events
  • Quick Bytes
  • RESOURCES
Home Quick Bytes Ransomware attacks increasing by the day, says Kroll
  • Quick Bytes

Ransomware attacks increasing by the day, says Kroll

By
ITsec Bureau
-
October 13, 2020
17
Ransomware attacks

Data investigations company Kroll says that ransomware attacks have increased exponentially. The security company said that ransomware attacks accounted for more than 1/3rd of the incidents it was called upon to investigate. The organization believes that 47% of the attackers utilized the open desktop protocol to target the remote employees. Many enterprises have implemented the open desktop protocol, but it can be manipulated to give threat actors access to the corporate network.

Read More: Ransomware Attacks – Demand Costs to Hit $1.4 Billion in 2020

Other common attack vectors included phishing emails, account takeover, and liability exploit. Kroll said that contrary to IBM’s forecast report, it was technology, telecoms, professional services, and healthcare that got hit by ransomware attacks.

Source: zdnet

  • TAGS
  • account takeover
  • Kroll
  • phishing emails
  • ransomware
  • RDP compromise
  • vulnerability exploit
Previous articleMicrosoft teams up with prominent organizations to plan TrickBot takedown
Next articleHow Neglecting These Cybersecurity Factors can Hurt an Enterprise’s Budget
Avatar
ITsec Bureau
http://itsecuritywire.com/

RELATED ARTICLESMORE FROM AUTHOR

DoControl Rises from Stealth Mode with SaaS Security Platform

DoControl Rises From Stealth Mode With SaaS Security Platform

PayPal Introduces New Fraud Management Tools for Vendors

PayPal Introduces New Fraud Management Tools For Vendors

Threat Actors Deliver IcedID Malware via Contact Forms

Threat Actors Deliver IcedID Malware Via Contact Forms

Latest posts

Covail and TruSTAR Announce Strategic Partnership to Advance Intelligence Management Capabilities Among Enterprises (2)

Covail and TruSTAR Announce Strategic Partnership to Advance Intelligence Management Capabilities Among Enterprises

August 28, 2020
MindPoint Group, FedRAMP Certification, Product Launch

MindPoint Group Makes FedRAMP Certification Easier with New Product Launch

April 28, 2020
Cybersecurity company chooses Wichita for new regional office

Cybersecurity company chooses Wichita for new regional office

March 19, 2021
Majority of Enterprises Expect to Suffer from Email-Borne Cyber-Attacks

Majority of Enterprises Expect to Suffer from Email-Borne Cyber-Attacks

June 11, 2020
Keyavi Data

Keyavi Data™ Launches Web Client, Four Apps and Free Online Viewer as Powerful Extensions of...

November 12, 2020


An invaluable resource for all your IT security initiatives and assets.

Knowledge sharing platform for all IT security needs and plans. Peer to peer conversations that leverage industry experts and leaders for ideas, opinions and business insights.

Media@ITSecurityWire.com
Sales@ITSecurityWire.com

Recent Posts

  • New Privacera And Dremio Technology Integration Enables Lightning Fast, Self-Service Analytics With Consistent Access Controls Across Hybrid- And Multi-Cloud Environments
  • Skybox Security Delivers Industry’s Most Advanced Exposure Analysis
  • Duality Technologies Teams With Oracle To Enable Privacy-Preserving Collaborative Investigations For Financial Crimes
  • WaveMaker Strengthens App Security With Veracode Certification
  • WhiteSource Releases Priority Score To Accelerate Application Security At Scale

Visit Our Other Publication

Quick Links

  • About Us
  • News
  • Featured Articles
  • Featured Interview
  • Guest Post
  • Privacy Policy
An Imprint of OnDot ® Media © | All rights reserved | Privacy Policy