Sign in

Airgap Networks
Stop Lateral Malware Movement in Real Time

Ransomware will continue to be the number one threat for companies in 2021. Zero Trust will be one of the only ways to truly mitigate the rash of attacks and hasten response time. Last year, CrowdStrike determined that the average breakout time of a cyber breach was 1 hour and 58 minutes. The Airgap Zero Trust Isolation platform surgically eliminates unauthorized communication and thwarts lateral propagation immediately with the Ransomware Kill Switch™.

In an industry where 76% of organizations say that threat detection and response is more difficult today than even just two years ago, and 74% of cybersecurity professionals…

Ryuk ransomware finds foothold in bio research institute through student who wouldn’t pay for software https://zd.net/3nPcT0s

#RSAC 2021

Over 15 sessions at this year’s RSA Security Conference will be around Zero Trust, you will not want to miss out on a demo of the industry’s first automated Ransomware Kill Switch™. Airgap is a proud sponsor of this year’s RSA Security Conference. Please contact Airgap to schedule a time to speak with Ritesh Agrawal, CEO and Co-Founder of Airgap, to learn more about this incredible innovation that will revolutionize the way companies protect their corporate assets in a Zero Trust approach. https://airgap.io/events/

Ryuk Ransomware

Ryuk ransomware has spelled destruction for organizations since its discovery in August 2018. At the end of…

Event Link CISO Roundtable | Airgap Networks for detailed interviews.

This CISO roundtable is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

The curriculum will incorporate a blend of strategic content, real-world playbook exercises, and peer discussion to help with ransomware defense strategy and success as a leader. Session themes for the day include:

The CISA Ransomware Campaign and Zero Trust Directives

Zero trust, supply chain security, and DevSecOps. These are the three 2021 priorities for CISA Cybersecurity Framework. In this event keynote, Amy Nicewick, Chief of Communications Management at Cybersecurity and Infrastructure Security Agency will…

Work From Anywhere 2021

The term ransomware attack refers to a particular malware and threat tactic that focuses on infiltrating enterprise networks and holding their critical files hostage through encryption. More advanced ransomware can hold entire servers and networks hostage via the same process. Either way, your users can’t access these necessary files or even log in with the files encrypted. Instead, your business must make a difficult choice. You can either pay the ransom the hackers ask to unencrypt your files or try to mitigate the predicament yourself.

For some businesses, this choice appears like anything but one. Many enterprises find the losses…

“Living off the Land” Threats and Device Cybersecurity in 2021

Prolific Ryuk ransomware has new tricks up its sleeve — “Worm-like” capabilities. The developers behind the notorious strain of crypto-locking malware have given their attack code the ability to spread itself between systems inside an infected network. (Reference: BankInfoSecurity.com)

“A Ryuk sample with worm-like capabilities — allowing it to spread automatically within networks it infects — was discovered during an incident response handled by ANSSI in early 2021,” according to a Ryuk report issued Thursday by CERT-FR, the French government’s computer emergency readiness team that’s part of the National Cybersecurity Agency of France, or ANSSI.

Specifically, the worm-like behavior is…

CLOP targeted attacks

A new trend is emerging among ransomware groups where they prioritize stealing data from workstations used by top executives and managers in order to obtain “juicy” information that they can later use to pressure and extort a company’s top brass into approving large ransom payouts.

CLOP Ransomware gangs are prioritizing stealing data from workstations used by executives in the hopes of finding and using valuable information to use in the extortion process.

The group sifts through a manager’s files and emails, and exfiltrates data that they think might be useful in threatening, embarrassing, or putting pressure on a company’s management…

Never trust, always verify. Zero Trust has now become the latest buzzword of the cybersecurity world. It is a security model consolidating the idea that no organization should automatically rely upon anything outside or even inside its boundaries. Every individual in an enterprise must validate everything and authenticate every person before granting access to connect with their systems.

Traditional security architectures are built on a castle-and-moat approach that is powered by firewalls, access controls, and VPNs, etc. so no access is obtained from an external network but every insider is automatically trusted. Zero Trust entails strict verification with an extra…

The term ransomware attack refers to a particular malware and threat tactic that focuses on infiltrating enterprise networks and holding their critical files hostage through encryption. More advanced ransomware can hold entire servers and networks hostage via the same process. Either way, your users can’t access these necessary files or even log in with the files encrypted. Instead, your business must make a difficult choice. You can either pay the ransom the hackers ask to unencrypt your files or try to mitigate the predicament yourself.

For some businesses, this choice appears like anything but one. Many enterprises find the losses…

Ransomware: New “Big-Game Hunting”

Ransomware attacks are on a sharp upward trend and with the rise of Ransomware as a service (RaaS) the threats will only increase. Ransomware as a service (RaaS) is a subscription-based model that enables affiliates to use already-developed ransomware software to execute ransomware attacks. In a turn straight out of a cybersecurity nightmare, affiliates via RaaS are able to earn a percentage of each successful ransom payment.

The lucrative opportunity that ransomware software presents to criminals combined with the rise of cryptocurrencies has fueled the modern-day ransomware gold rush. Ransomware attacks are a gold rush for cybercriminals, with payout averages…

When WannaCry struck, organizations worldwide feared they would be next until an unsuspecting hero appeared, sink-holing the worm with a kill switch[1]. Since then, security defenders beyond all sectors have been trying to devise their kill switch.

[1] https://techcrunch.com/2019/07/08/the-wannacry-sinkhole/

The term “kill switch” usually refers to a way to disconnect specific networks from the internet in the event of a grave attack, and traditionally it has only been applied in emergencies. They often are discovered by researchers after an attack has been identified, but they also can be built-in mechanisms.

In the setting of cyberthreats, though, a kill switch associates…

Airgap Networks

Zero Trust Isolation — The Best Defense Against Ransomware Propagation. https://airgap.io

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store