Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320

Eternal Rocks To Use Seven Exploits in Comparison to WannaCry's Two

Cybersecurity researchers have discovered a new exploit which uses seven of the NSA’s leaked exploits. “EternalRocks”, a new malware, uses the exploits first discovered by the National security agency, experts are describing this malware as “doomsday” which can strike anytime.

Read More

WannaCry – Ransomware explosion hits hundreds of companies around the world

By now, we’ve all heard of the events of Friday 12th May. One of the largest, highly-profiled ransomware attacks struck the NHS and other organisations, but few are probably aware of the scale of the assault. Targets were also attacked in Spain, Brazil, Russia, India, China and throughout EMEA – this attack hit hard throughout the world.

Read More

10 Steps To An Effective Ransomware Protection Strategy

In light of the recent widespread takedown of NHS systems by Wanna Decryptor 2 ransomware, at the forefront of many CISO’s thoughts this weekend will be how to protect their enterprise data against falling foul of the many varieties of ransomware available in the wild.

Read More

New Year, New SPORA

A new form of ransomware has been detected on the security radar. It is known as SPORA, and as devastating as it is, it has some notable developed features that are quite impressive.

Read More

New Manoeuvres to Deliver Ransomware and Avoid Anti-Virus Detections

In the modern age, groups of anonymous hackers are utilising new tactics to deliver and compromise remote target systems. The traditional system of using email attachments as a way to distribute these tactics is still being widely used, and considered to be the main way of targeting victims.

Read More

How Ransomware Works

Ransomware is similar to other malware in that it installs itself on a computer and runs in the background without the user’s knowledge. But unlike malware that hides and steals valuable information, ransomware doesn’t hide. As soon as ransomware has locked a user’s machine and/or encrypted files, it notifies the user of its presence to make the ransom demand.

Read More

Frequent & Dangerous: Discover Seven Cyberattacks You Will Face Sooner Or Later

“Cybercriminals to compromise company: business loses $56 million.” Do you find this headline familiar? Such front-page news and analysis of large-scale attacks hit us every day. Read more on why Prevention just isn't enough

Read More

Website offline? New server-focused FAIRWARE Ransomware could be why

In a time of non-stop news stories about ransomware, a new variant called FAIRWARE is attacking Linux-based servers running web sites.

Read More

Protect against CryptoLocker Ransomware

Recently, attackers employing a CryptoLocker variant have been removing volume shadow copies on systems, disallowing the users from restoring those files and then encrypting the files for ransom. If a user cannot recover from backups, he/she is at the attacker’s mercy.

Read More

How to take control of the ransomware problem

When will we be finally rid of ransomware? I imagine CISOs up and down the land repeat the same question most every day. Because it’s on a near daily basis we hear of yet another new variant causing havoc around the world. Most recently, reports have focused on new strains being offered “as-a-service” for non-technical cybercriminals to disseminate, ensuring the outbreak has now reached epidemic proportions. The truth is that until all organisations start refusing to pay the ransom, and/or get better at security basics, there’ll always be enough profit to keep the black hats interested.

Read More