Web Analytics Made Easy - Statcounter

Latest News

How to Safeguard Your Business from Unauthorised Physical Intrusions: A Comprehensive Guide

How to Safeguard Your Business from Unauthorised Physical Intrusions: A Comprehensive Guide

Introduction In today’s interconnected world, businesses face a constant threat of unauthorised intrusions. Whether it’s a physical break-in or a cyberattack, these incidents can have devastating consequences for your organisation.

Read more
The Ransomware Negotiation Dilemma: The Pros And Cons Of Negotiation Strategies BSides Exeter UK 2024

The Ransomware Negotiation Dilemma: The Pros And Cons Of Negotiation Strategies BSides Exeter UK 2024

BSides Exeter has finally released the youtube video of the talk “The Ransomware Negotiation Dilemma: The Pros And Cons Of Negotiation Strategies”

Read more
Could your Cleaners be a Vulnerability in your Physical Security

Could your Cleaners be a Vulnerability in your Physical Security

The Overlooked Weak Link: Could your Cleaners be a Vulnerability in your Physical Security If you’ve ever worked in a large corporate office, you’re likely familiar with the different groups that keep the place running—employees, engineers, managers, and even external contractors.

Read more
Sharing After the Storm: Fostering Transparency in Post-Ransomware Response

Sharing After the Storm: Fostering Transparency in Post-Ransomware Response

Sharing After the Storm: Fostering Transparency in Post-Ransomware Response Ransomware attacks are a harsh reality of the digital age.

Read more
BSides Exeter, South West UK 2024: Let's talk about Ransomware Negotiation

BSides Exeter, South West UK 2024: Let's talk about Ransomware Negotiation

Gear Up for BSides Exeter: Unveiling the Secrets of Ransomware Negotiation Calling all cybersecurity professionals and enthusiasts in the southwest of England!

Read more
Securing Your Strategy: Preparing for Ransomware Attacks and Payment Dilemmas

Securing Your Strategy: Preparing for Ransomware Attacks and Payment Dilemmas

Would you be prepared to make a Ransomware Payment? Another year has passed, more Ransomware gangs have been taken offline by law enforcement, yet the anticipated decline in ransomware and double extortion attacks remains elusive.

Read more
LockBit Ransomware Operations Seized in ‘Operation Cronos’: What You Need to Know

LockBit Ransomware Operations Seized in ‘Operation Cronos’: What You Need to Know

A lot has happened in the last few days since the 19th February 2024, in the dark world of Ransomware gang activity.

Read more
Unmasking Ransomware: Origins, Types, and Notorious Attacks

Unmasking Ransomware: Origins, Types, and Notorious Attacks

Introduction: Ransomware, a malicious software that encrypts a victim’s files or entire computer system and demands payment for their release, has become a pervasive and formidable threat in the digital age.

Read more
Ransomware Negotiation Tactics Evolve as Victims Seek Discounts and Threat Actors Try to Avoid Being Scammed.

Ransomware Negotiation Tactics Evolve as Victims Seek Discounts and Threat Actors Try to Avoid Being Scammed.

The landscape of ransomware negotiation is undergoing significant evolution, as illustrated by a recent reported news story involving a European manufacturing company.

Read more
What are the Pros and Cons of Ransomware Negotiation?

What are the Pros and Cons of Ransomware Negotiation?

Navigating a ransomware attack is an incredibly stressful situation, and the decision to negotiate with the attackers is far from straightforward.

Read more
Social Engineering: Emotions and Tactics

Social Engineering: Emotions and Tactics

Here at Brainstorm Security, we use social engineering all the time to conduct physical penetration tests, phishing simulations, ransomware negotiations and even who’s turn it is to make the coffee!

Read more