How Ransomware-as-a-Service is Used in Ransomware Attacks

With average ransom demands now in the millions, ransomware attacks are a lucrative business. It’s no wonder then that more people are trying to get a piece of the profit, and it’s becoming easier than ever to do it with the rise of ransomware-as-a-service. Just like software-as-a-service businesses provide easy access to software, ransomware-as-a-service businesses…

Read More

Top Cyberthreats for Hotels

As travel restrictions ease in 2022, hotel InfoSec departments are preparing for an influx of customers as well as an increase in cyber attacks. Hotels secure a large amount of sensitive customer data and have a broad attack surface, so they are common targets for threat actors. Here are five of the top cyber threats…

Read More

Remote Desktop Protocol Use in Ransomware Attacks

According to the 2020 Unit 42 Incident Response and Data Breach Report, remote desktop protocol (RDP) services were the initial attack vector in 50% of ransomware deployment cases. RDP services have been a popular attack vector for years, particularly for use on small enterprises where phishing emails may not be as successful. However, the COVID-19…

Read More

5 Most Common Ransomware Types in 2022

Colonial Pipeline. JBS. Kaseya. 2021 was a record year for high-profile, expensive ransomware attacks. In 2022 we can only expect this to continue, as ransomware-as-a-service expands threat actor accessibility to tools, and new double/triple extortion ransomware attacks raise potential profits even higher. Although the retail and hospitality sector has not been hit nearly as hard…

Read More

RH-ISAC Podcast Goes Public

In October 2021, RH-ISAC launched a members-only podcast highlighting best practices in cybersecurity. RH-ISAC is excited to announce our podcast is now moving public in a newly revised format and will be available to members and non-members alike on major podcast platforms. Part of RH-ISAC’s mission is to be a trusted cybersecurity resource for the…

Read More