Code Story - Most destructive? Ransomware.

Code Story
Most destructive? Ransomware.
By Code Story • Issue #84 • View online
This newsletter is sponsored by our friends at Anomali. Download their Cybersecurity Insights Report for 2022.
In recent years, no cyberattack payload has been more destructive to business and government organizations than ransomware. And to be clear, this is not new… the earliest variants of ransomware were developed in the late 1980s. This type of malware made a resurgence in 2019 with high profile attacks made on state and local government.

The Impact of these Attacks
The global impact of these attacks was quantified in Anomali’s recently published Cybersecurity Insights Report 2022 that included a Harris Poll survey of security professionals with analysis by the Anomali Threat Research team. In this report, the company found that:
  • 52% of organizations were hit by ransomware attacks in the last three years
  • 39% of victims paid a ransom to regain control of their data and systems.
Solving for ransomware requires a continuous global approach to detection that is rooted in intelligence. Let’s take one of the most notorious spates of ransomware attacks that leveraged three types of malware, Emotet, TrickBot and Ryuk to expertly extort over $61 million dollars from businesses in 2020 according to the US Federal Bureau of Investigations.
To remind readers, Emotet infiltrates an organization, spreading from the primary infected endpoint to other endpoint victims spreading TrickBot which establishes a command-and-control (C2) connection allowing the attacker to assess the victim and then spread Ryuk payload which delivers the ransomware.
Anomali delivers a cloud-native extended detection and response (XDR) solution  via The Anomali Platform,  that drives detection, prioritization, and analysis, taking security from intelligence to detection in seconds. Companies use Anomali to enhance threat visibility, automate threat processing and detection, and accelerate threat investigation, response, and remediation ultimately helping organizations to detect and respond to ransomware at all stages of the attack. 
So, what is a CISO to do?
Have Global Situational Awareness
Stop Initial Access
Stop the Attack
Stop the Communication
Stop the Payload
Did you enjoy this issue?
Code Story

Code Story is a podcast, interviewing tech leaders about the roads they travelled creating world changing products. Monthly, we look back at the episodes highlights, happenings for the show and opportunities for support. Stay tuned, and sign up today.

In order to unsubscribe, click here.
If you were forwarded this newsletter and you like it, you can subscribe here.
Powered by Revue

Older messages

400k Downloads!!

Tuesday, March 29, 2022

We've hit 400k all time downloads!! Thank you!! To celebrate... we are offering a free Code Story Ts 400k Downloads!! By Code Story • Issue #83 • View online We've hit 400k all time downloads!!

Meet the email delivery service that people actually like.

Monday, March 28, 2022

This message is sponsored by Postmark.Email infrastructure isn't the most exciting thing — setting it Meet the email delivery service that people actually like. By Code Story • Issue #82 • View

Check out our SWAG!

Monday, March 7, 2022

Did you know Code Story sells t-shirts? And not just that, but all kinds of stuff, at our Teepublic s Check out our SWAG! By Code Story • Issue #81 • View online Did you know Code Story sells t-shirts?

Code Story - February 2022

Thursday, March 3, 2022

Happy late Valentines Day from Code Story! To go with your oversized, stuffed teddy bear and box of c Code Story - February 2022 By Code Story • Issue #80 • View online Happy late Valentines Day from

Easiest, most secure way to access infrastructure.

Thursday, February 17, 2022

As a developer, do you ever find yourself bouncing between environments, between the layers of comput Easiest, most secure way to access infrastructure. By Code Story • Issue #79 • View online As a

You Might Also Like

You’re invited: See how Cypris scaled AI search

Thursday, March 20, 2025

Join our virtual event to learn how Cypris built a scalable AI research platform with Elastic.ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ

JSK Daily for Mar 19, 2025

Wednesday, March 19, 2025

JSK Daily for Mar 19, 2025 View this email in your browser A community curated daily e-mail of JavaScript news Hope AI By Bit. - Developer teams build with AI and composable software. ✅ Build full-

Forget TypeScript, how about porting Doom to Go?

Wednesday, March 19, 2025

Plus should Go have tuples? | #​546 — March 19, 2025 Unsub | Web Version Together with Frontend Masters logo Go Weekly Traversal-Resistant File APIs — Among the lesser known new features in recent

Daily Coding Problem: Problem #1722 [Medium]

Wednesday, March 19, 2025

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Dropbox. Create an algorithm to efficiently compute the approximate median of a list of

Ranked | The World's Fastest Growing Economies in 2025 📊

Wednesday, March 19, 2025

The fastest growing economies of 2025 are primarily located in Africa and Asia, according to the latest IMF forecasts. View Online | Subscribe | Download Our App Presented by: Defiance ETFs FEATURED

Web Almanac: JS; syntactic quirks; Parcel v2.14.0; Bun v1.2.5; Node.js on Discord; Node v20.19.0

Wednesday, March 19, 2025

We have 9 links for you - the latest on JavaScript and tools The easiest security tool you will ever install. socket.dev Sponsor Socket's developer-first platform detects and blocks malicious

Microservices rules #7: Design loosely design-time coupled services - part 1

Wednesday, March 19, 2025

You are receiving this email because you subscribed to microservices.io. Considering migrating a monolith to microservices? Struggling with the microservice architecture? I can help: architecture

[Report] 69% of Attacks Bypass Defenses

Wednesday, March 19, 2025

69% of attacks go undetected. Breach and Attack Simulation pinpoints you where your defenses fail—before attackers do. ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏

11 Windows apps I always trash 🗑️

Wednesday, March 19, 2025

Forget SaaS; Change this TV setting; Amazon Spring Sale deals -- ZDNET ZDNET Tech Today - US March 19, 2025 delete key The 11 Microsoft apps I ditch on every new Windows install - and the 11 I keep A

⚙️ Nvidia's 'incredible' demand

Wednesday, March 19, 2025

Plus: The DNA of organized crime ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌