Ransomware Task Force aims to disrupt ransomware payments globally
Events
About
If you already have an account please use the link below to sign in.
If you have any problems with your access or would like to request an individual access account please contact our customer service team.
The new coalition aims for a unified, comprehensive, public-private campaign against ransomware groups
Ransomware Task Force aims disrupt ransomware payments globally
The Ransomware Task Force, an alliance of some of the world s top tech firm and government agencies, has released a new framework that aims to disrupt ransomware groups by going after their financial operations and limiting their ability to get paid.
Date: Tuesday, March 23rd at 11am PST / 2pm EST
Cyber Risk in the supply chain has existed since the beginnings of cybersecurity as a discipline. The SolarWinds cyberattack campaign also called Solorigate or simply the SolarWinds hack leverages vulnerabilities in SolarWinds Orion software to accomplish a supply chain attack. Malware was embedded into the digitally-signed software and multiple organizations were compromised as a result.
Join BlueVoyant’s Chairman of International Business, Robert Hannigan, Mike Scutt, Director of Hunt Operations at BlueVoyant along with Ryan Becwar, Sr. Security Consulting Solution Engineer at Splunk for an in depth discussion about the SolarWinds attack, and learn best practices and strategies to strengthen your defenses. We will talk about the use of Splunk Enterprise Security to identify risks, and to actively detect and respond to these emerging threats. We will then explore how BlueVoyant responded to Solarwinds, highlighti
DHS, CISA and NCSC Issue Warnings After SolarWinds Attack
Government agencies have issued warnings about the fresh spate of attacks, apparently from nation-state actors against major security vendors.
Last week FireEye disclosed that it had spotted an attack from nation state actors looking for data on government clients, where attackers were able to access some internal systems and steal some of FireEye’s red team tools. It was later disclosed that the attack was enabled by using trojanized updates to SolarWinds’ Orion IT monitoring and management software, although Solarwinds said that fewer than 18,000 of its global customers had been affected.