Just a few years ago, few companies had ever heard of ransomware. Today, it has become a cybersecurity scourge. This article, the first of a three-part series on this cybersecurity threat, explores what it is, how it evolved, and why […]
Discover top-tier, integrated cybersecurity solutions designed to protect your business. Stay updated on the latest trends in the cybersecurity landscape and learn how advanced threat intelligence and actionable insights can help you swiftly identify and counter today’s most significant cyber threats. Explore our cybersecurity solutions to unlock efficiencies, automate protection, and neutralize threats with transformative security technology and expert consulting.
Just a few years ago, few companies had ever heard of ransomware. Today, it has become a cybersecurity scourge. This article, the first of a three-part series on this cybersecurity threat, explores what it is, how it evolved, and why […]
Black Lotus Labs’ analysis has uncovered a cluster of compromised websites previously used in a series of watering hole attacks. Any visitors who browsed to one of the sites would unknowingly be infected and vulnerable to the threat actor stealing […]
For years, companies have used content delivery networks (CDNs) to deliver content as close to their users as possible. This is becoming more challenging. The pandemic has accelerated remote access and spiked both traffic volumes and security threats. The CDN […]
Customers should verify their IP indexes to prevent traffic from being dropped When you clicked the link to read this blog, you triggered a series of actions that directed your data across the internet to this page using the most […]
As the toll of the pandemic continues to plague nearly every sector of the economy, the cybersecurity landscape is seeing attack after attack from bad actors that are finding opportunities to capitalize on the chaos. As such, the demand for […]
As digital architectures become more distributed and the edge continues to extend closer to end users than ever before, securing applications and the networks on which they rely has become an equally rising challenge. In addition to traditional threats, security […]
We’ve all been there. Head down, staring at our smart phone waiting for a new app to install. You quickly swipe through the terms and conditions before hitting “accept,” excited and ready to use the latest technology. Today’s applications offer […]
Since the second half of 2020, Lumen Black Lotus Labs® has observed an unsettling number of entities receiving emails containing a threat of sustained DDoS attack unless a Bitcoin ransom was paid. These attacks – known as Ransom Distributed Denial […]
Bolstered by contributions from Black Lotus Labs and others, Microsoft and FS-ISAC recently took court action to disrupt a particularly insidious botnet called TrickBot – a significant source of ransomware and banking credential theft. As the threat intelligence arm of […]
Summary The explosion of Internet of Things (IoT) devices has long served as a breeding ground for malware distribution. The inability for users to patch many IoT devices has only compounded this problem, as bad actors continue to evolve tactics […]