Ransomware

July 6, 2023

The Week in Security: Third-party breach exposes  customer to LockBit, countries team to block DDoS

Yet another third-party vendor breach leaves customer vulnerable to ransomware. Also: The UAE teamed up with Israel to defend against a major DDoS attack. 
April 27, 2023

The Week in Security: A possible Colonial Pipeline 2.0, ransomware takes bite out of American eateries

This week: Canadian gas pipeline explosion could have been caused by a cyber attack. Also: Financial services firm NCR hit with a ransomware attack.
January 5, 2023

The Week in Security: Ransomware attacks close out 2022 with a bang, PyTorch compromise explored

The tail-end of 2022 was plagued by ransomware attacks on critical infrastructure. Also, we break down the PyTorch software supply chain attack.
December 1, 2022

The Week in Security: Docker Hub leaks secrets, Black Basta ransomware gangs up on retailer

This week: Another open-source platform is being used by cybercriminals. Also: the Black Basta ransomware gang takes credit for the attack on Maple Leaf Foods. 
August 15, 2022

Black Hat: We should have seen the Colonial ransomware attack coming, says Kim Zetter

The ransomware attack on Colonial Pipeline was a wakeup call. But cybersecurity journalist Kim Zetter believes we should have seen it coming.
August 9, 2022

GwisinLocker ransomware targets South Korean industrial and pharma firms

GwisinLocker is a new ransomware family that targets Linux in industrial and pharma companies with sophisticated "double extortion" ransomware campaigns. 
July 21, 2022

Three decades later, ransomware's first act still resonates

Ransomware has taken the world by storm, with big payouts — and disruption of critical infrastructure. Here’s a look at the key factors driving the rise.
July 8, 2022

The Week in Cybersecurity: NPM removes malicious modules, Microsoft backtracks on macros

This week: fallout from another supply chain attack involving malicious NPM modules. Also: Microsoft backtracks on a pledge to disable Office macros. 
June 28, 2022

Smash-and-grab: AstraLocker 2.0 pushes ransomware direct from Office docs

ReversingLabs recently discovered instances of the AstraLocker 2.0 malware distributed directly from Microsoft Word files used in phishing attacks.

SUBSCRIBE

Get our blog delivered to your in-box weekly to stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ConversingLabs: The State of Open Source Software Security ConversingLabs: The State of Open Source Software Security
Conversations About Threat Hunting and Software Supply Chain Security
ReversingGlass: SBOMS and threat modeling ReversingGlass: SBOMS and threat modeling
Glassboard conversations with ReversingLabs Field CISO Matt Rose
Software Package Deconstruction: Video Conferencing Software Software Package Deconstruction: Video Conferencing Software
Analyzing Risks To Your Software Supply Chain