Tag

Ransomware Prevention

Ransomware prevention content provides actionable strategies for defending against ransomware attacks before they encrypt critical data. Articles cover backup protocols, endpoint detection, network segmentation, patch management, and incident response planning tailored to ransomware scenarios.

posts

Dark Web Monitoring

Dark Web Monitoring for Businesses: A Practical Guide

Your Employees' Passwords Are Already for Sale In March 2024, a single dark web marketplace listed over 10 billion stolen credentials. That's not a typo. The Verizon 2024 Data Breach Investigations Report found that stolen credentials were involved in roughly 31% of all breaches over the past

Carl B. Johnson Jun 25, 2020 8 min read
Stolen Credentials Dark Web

Stolen Credentials Dark Web: How Your Logins End Up for Sale

In May 2024, the FBI and international partners seized BreachForums — one of the largest marketplaces where stolen credentials on the dark web were bought and sold in bulk. The forum had facilitated the sale of billions of compromised records, including credentials tied to U.S. government agencies, healthcare organizations, and

Carl B. Johnson Jun 25, 2020 7 min read
Trojan Horse Malware

Trojan Horse Malware: How It Gets In and How to Stop It

The Fake Invoice That Cost a Hospital $28 Million In 2024, Ascension Healthcare disclosed a ransomware attack that disrupted operations at 140 hospitals across 19 states. The initial entry point? An employee opened what appeared to be a routine file. It was trojan horse malware — a malicious payload disguised as

Carl B. Johnson May 08, 2020 7 min read
Medusa Ransomware

Medusa Ransomware Gang Phishing Campaigns: What to Know

In March 2025, CISA and the FBI issued a joint advisory warning that the Medusa ransomware gang had compromised over 300 organizations across critical infrastructure sectors — healthcare, education, legal, insurance, and manufacturing. The attack vector in the vast majority of cases? Phishing. Not some exotic zero-day exploit. Not a nation-state

Carl B. Johnson Feb 28, 2020 7 min read
Social Engineering Examples

Social Engineering Examples That Bypass Every Firewall

The Attack That Didn't Need a Single Line of Code In September 2022, an 18-year-old allegedly breached Uber's internal systems. The method wasn't a zero-day exploit or some sophisticated malware. It was a text message. The attacker bombarded an Uber contractor with multi-factor authentication

Carl B. Johnson Jan 09, 2020 7 min read
Cybersecurity Training for Employees

Cybersecurity Training for Employees: A 2026 Guide

The Breach That Started With a Single Click In January 2024, a finance department employee at a mid-size manufacturing firm opened what looked like a routine DocuSign notification. Within 72 hours, a threat actor had exfiltrated 1.2 million customer records and deployed ransomware across the company's entire

Carl B. Johnson Dec 14, 2019 7 min read
Ransomware Prevention

How to Prevent Ransomware: A Practical Defense Guide

The Attack That Shut Down 100 Million Prescriptions In February 2024, a ransomware attack on Change Healthcare paralyzed pharmacy operations across the United States. Hospitals couldn't process claims. Patients couldn't fill prescriptions. UnitedHealth Group ultimately disclosed the breach affected roughly 100 million individuals — the largest healthcare

Carl B. Johnson Nov 30, 2019 7 min read