The Infocyte Blog

Category: Ransomware

Managed Detection and Response 101 [Video]

Cyberattacks are at an all-time high. Ransomware is all over the news, and killware is the next big fear. Hackers are growing more competent at detecting gaps and loopholes in corporate security systems. They can obtain access to secured files and data as technology advances, creating a serious cybersecurity concern. Cybercriminals target organizations with some…

Read More »
French headquarters of Microsoft

Microsoft 365: Should Your Organization be Worried About Microsoft 365 Vulnerabilities?

Microsoft 365 hails as the lifeblood of most American (and global) small-medium sized enterprises. Since the wake of the Covid-19 pandemic, cybercriminals and hackers have seemed to up their illegal game by targeting more organizations than ever witnessed before. This year alone, tens of thousands of organizations had the security of their Microsoft 365 systems…

Read More »

How an MSSP successfully fought off a major cyber attack

This post was last updated on November 19th, 2021 at 03:27 pmHere at Infocyte, we are helping our customers and partners respond to major attacks on almost a weekly basis. When I say attack, I don’t mean an antivirus notification about a bad file that a user inadvertently downloaded. The attacks I am talking about…

Read More »
A team of government agents executing ransomware protection methods

How Can State and Local Municipalities Protect Themselves from Ransomware?

This post was last updated on November 3rd, 2021 at 09:54 amThe extent of ransomware attacks among government entities was especially revealed when the world, particularly the US, was countering the pandemic. It’s now clear that cybercriminals might continue halting delivery of essential services unless state and local municipalities do something to end the ransomware…

Read More »
Detecting and Responding to Ransomware Attacks

Behind the Scenes: What Happens in a Ransomware Attack? [Video]

This post was last updated on September 27th, 2021 at 12:31 pmThe first step to protecting yourself from a ransomware attack is understanding what it actually is. The behaviors that constitute a threat might individually seem like perfectly normal activity, even to someone who knows what they are looking for. If we put ourselves in…

Read More »

Responding to Kaseya VSA Vulnerability & REvil Ransomware Attack

Infocyte Guide to Responding to Kaseya VSA Vulnerability & Ransomware Attack

Read More »
Infocyte Threat Intel & Response

Expanding Infocyte’s Threat Intelligence and Response Function

This post was last updated on December 5th, 2021 at 08:16 pmAt its core, Infocyte’s mission has always been to help our customers and partners to find, investigate and purge cyber threats from their networks. We do this through our automated SaaS platform and the expertise of our team. The challenge is security teams find…

Read More »
cyber endpoints bkg

Exchange Week 2 – Ransomware Joins The Fray

This post was last updated on August 24th, 2021 at 10:02 amFollowing exposure and publication of a major remote execution vulnerability like Exchange’s ProxyLogon (CVE-2021-26855), we expect other threat actors to join the race against system administrators trying to patch their systems. Initial reporting showed the threat actor dubbed HAFNIUM were quietly exploiting these vulnerabilities since…

Read More »
proactive cybersecurity best practices

6 Best Practices for Business Cybersecurity [October 2021 Update]

This post was last updated on October 6th, 2021 at 12:29 pmWhen we first published this article in July of 2019, the RSM US Middle Market Business Index survey reported that 15% of mid-market businesses had suffered a data breach that year. This was already a considerable jump from 5% in 2015, and the trend…

Read More »