2018 Cyberthreat Defense Report Addresses Latest Ransomware Realities

How Complete Beginners are using an ‘Untapped’ Google Network to create Passive Income ON DEMAND

CyberEdge Group, a premier research and marketing firm serving the security industry’s top vendors, today announced immediate availability of its fifth annual Cyberthreat Defense Report.

New this year, the report found that 55 percent of responding organizations were compromised by ransomware in 2017, down from 61 percent in 2016.

However, respondents who were victimized by ransomware and who elected to pay the ransoms (customarily using Bitcoin) were asked if they successfully recovered their compromised data. Surprisingly, only half confirmed successful data recovery, while the other half acknowledged complete data loss.

With 1,200 IT security decision makers and practitioners participating from 17 countries, six continents, and 19 industries, CyberEdge’s Cyberthreat Defense Report is the most comprehensive study of security professionals’ perceptions in the industry. This study provides a 360-degree view of organizations’ security threats, current defenses, and planned investments.

“Got a coin? Flip it to see if you’ll get your data back after paying a ransom associated with ransomware. That’s just plain scary,” said Steve Piper, CEO of CyberEdge Group. “In 2017, 55 percent of our respondents’ organizations were victimized by ransomware. Of those victims that refused to pay the ransom (61 percent), the vast majority (87 percent) recovered their data from backups. This just underscores how important it is to incorporate a sensible data backup strategy as part of an organization’s cyberthreat defense strategy.”

“The 2018 Cyberthreat Defense Report is the result of one of the few independent surveys of security practitioners. While many leading vendors provide their own research of the cybersecurity space, it is important to supplement their findings and conclusions with unbiased research and analysis such as the Cyberthreat Defense Report,” said Richard Stiennon, chief research analyst at IT-Harvest. “The leveling off of the percent of respondents reporting breaches is a good sign, but at 77.2 percent, it is still very high and paints a picture of no end in sight for serious breaches in the coming years. I hope all security teams show this to their senior leadership.”

To check out the report, click here.

The post 2018 Cyberthreat Defense Report Addresses Latest Ransomware Realities appeared first on Mobile Marketing Watch.

Mobile Marketing Watch

Cash For Apps: Make money with android app

Oxford English Dictionary adds Ransomware, EULA and 1000 other new words

The Oxford English Dictionary added 1,100 new entries in its January 2018 update. Wordsmiths the world over now have the official go-ahead to use ransomware, EULA, and mansplain, which should make life easier for misogynistic IT security experts. Tech terms like e-address (who says that?) and esc (not to be confused with ESC, even though they’re the same thing) made the list, but for once it wasn’t all about OMGs and LOLs. The clear star of the January update is the word “ransomware,” which after being on a lot of computers in 2017 deserves a spot in the “definitive record…

This story continues at The Next Web
The Next Web

US declares North Korea the culprit behind devastating WannaCry ransomware attack

The US has declared North Korea the perpetrator of the widespread and financially devastating WannaCry ransomware cyberattack that rapidly spread across the globe in May, hitting hospitals, companies, and other critical institutions in countries around the world. The announcement came in the form of an op-ed in The Wall Street Journal authored by President Donald Trump’s Homeland Security Advisor, Thomas Bossert.

News of the administration’s announcement was reported earlier today by The Washington Post, which reports that the White House will be issuing a formal statement tomorrow. It was reported back in June that the US National Security Agency was in possession of evidence that pointed to North Korea. Bossert’s op-ed publicly…

Continue reading…

The Verge – All Posts

New BadRabbit ransomware spreads through Eastern Europe

A new ransomware attack named BadRabbit is spreading through Russia, Ukraine, and other Eastern European countries. Targeting corporate networks, computer systems for the Kiev Metro, Ukraine’s Odessa International Airport, several Russian media outlets, and others have been affected, with systems encrypted and computers displaying a ransom message.

Cybersecurity researchers at ESET and Kaspersky are among the organizations keeping watch. Both say the authors have ties with Petya, the ransomware attack that spread worldwide earlier this summer. Cybersecurity firm Kaspersky found that both Petya and BadRabbit appeared on dozens of the same hacked websites, according to a report from Wired. Both spread by using the Windows Management…

Continue reading…

The Verge – All Posts

New ransomware is causing major issues across Europe and Russia

There's a new ransomware making the rounds today with confirmed targets in Russia, Ukraine, Turkey and Germany. Kaspersky Labs says that nearly 200 victims have been hit with the ransomware that's been dubbed Bad Rabbit.
Engadget RSS Feed

FBI arrests security expert who stopped WannaCry ransomware attack

MalwareTech, the security researcher who stopped the spread of WannaCry ransomware, has been detained following a trip to DEF CON in Las Vegas. A friend, who spoke to Motherboard under condition of anonymity, said, I’ve spoken to the US Marshals again and they say they have no record of [MalwareTech] being in the system. At this point we’ve been trying to get in contact with [MalwareTech] for 18 hours and nobody knows where he’s been taken. The friend added that, when they attempted to visit MalwareTech shortly after he was first detained, he’d already been moved. No one seems to know what…

This story continues at The Next Web
The Next Web