| 0 minute read

Lockbit 2.0 Ransomware Infographic

map of world ransomware

An attacker leveraged a combination of Microsoft Exchange vulnerabilities (ProxyShell), which led to the deployment of Lockbit 2.0 ransomware. Here's what happened:

lockbit infographic

If you suspect ransomware or experience any type of cyber incident, call our Incident Response number at 1.877.216.2511 or, if you have any questions for our cybersecurity experts, feel free to contact us online.

CONTACT US

Blog Articles

New York Department of Financial Services (NYDFS) Amendments Effective November 2024

As covered in our previous article, the New York Department of Financial Services (NYDFS) updated its Cybersecurity Regulation in 2023. To help entities roll out the changes and new requirements, they have provided phased timelines for when these items must be implemented by.

Risks Lurking in the “Shadows”: Shadow IT and Shadow AI

You may have heard the saying: “Change is the only constant in life.” This is certainly true of the information technology industry, which in turn, has a ripple effect on the technology, services, risk, and regulatory requirements that impact your organization and its environment.

Focusing In On the New “Govern” Function in NIST CSF 2.0

In February 2024, the National Institute of Standards and Technology (NIST) released Version 2.0 of the Cybersecurity Framework (CSF or the Framework) which is the first significant update to the Framework since 2014 when it was first created.

Vector

About Us

Curabitur tincidunt eros sed magna dignissim semper. Sed bibendum tincidunt mauris, at auctor nisi. Mauris sed urna orci. Sed posuere justo odio, vel rhoncus neque sodales sed. Etiam ornare iaculis leo, et tincidunt neque vulputate at.