Babuk Ransomware (RaaS): Back-up Deletion and how to stop it

Babuk ransomware was discovered in January 2021 and operated a ransomware-as-a-service (RaaS) model before shutting down its operations in April. The group’s modus operandi is much like other RaaS operations, compromising organizations via phishing attempts or vulnerability exploits such as those used by HAFNIUM to gain initial access. This is followed by exfiltration of sensitive …

Defend against Log4Shell exploits (CVE-2021-44228) with ReaQta-Hive

A previously unknown vulnerability, CVE-2021-44228 also dubbed Log4Shell, in Apache’s popular logging library, Log4j, was discovered to have been exploited in the wild for several days prior to the vulnerability being publicly disclosed on 9 December. Affected versions of Log4j include 2.0-beta9 to 2.15.0. The vulnerability, through a simple exploitation, provides an attacker with the …

The arrival of Windows 11, seamlessly supported by ReaQta

Microsoft has made Windows 11 operating system available for new machines since October 5, 2021 and having the Windows 11 ISO download go-live at the same time. This means that anyone can update their existing machine without waiting for a prompt or choose to do a complete fresh install by themselves. According to a note …

Understanding the Avaddon Ransomware: Is your organization equipped to stop zero-day threats?

Recently, The Financial Times reported that Asian subsidiaries of a French Global insurance company were hit by a latest ransomware attack known as Avaddon. Attackers seized 3TB of data, impacting IT operations in Thailand, Malaysia, Hong Kong and the Philippines, taking hold of sensitive information like medical records and hospital data. What is Avaddon ransomware …

Defending attacks to the SWIFT network

Rising cyber fraud and insider threat cases continue to plague the financial industry growing the need to secure SWIFT networks  Leveraging behavioral analyses, ReaQta’s Detection Strategies enables banks to fully customize unique sets of detections to guard access to SWIFT networks As SWIFT cyber fraud rises in recent years, financial institutions today face a devastating …

Post-breach, what happens now? ReaQta’s all-in-one EDR and Forensic tool gathers information in minutes for effective post-breach recovery

ReaQta melds Endpoint Security EDR/XDR protection with forensic capabilities to form integrated cybersecurity offerings As COVID-19 continues to limit travel, remote forensic data collection offered by ReaQta-Hive will grow to become a staple for any organization Post-breach, every minute counts. The growing occurrence of grievous cyber breaches, coupled with tightening governmental regulations that dictate the …

Close Bitnami banner
Bitnami