Ransomware on the Rise: The alarming trend and how to combat it. 

As technology evolves, so does the threat of malicious cyberattacks like ransomware. With the rise in ransomware attacks poised only to grow, there's a few strategies your organization can employ to protect yourself from the threat.

Continue reading

Why Privacy Policies Aren’t What They Seem: Leveraging Global Threat Intel to Keep Your Mobile Data Safe

Cyber criminals are more active than ever, which means protecting your data has never been more important. One in three websites related to the outbreak of coronavirus launched this year are […]

Continue reading

RiskAnalytics’ browser extension helps keep data secure from anywhere during COVID-19 outbreak

Coronavirus has quickly forced businesses to switch to remote work, leaving millions of devices vulnerable and causing an uptick in phishing campaigns. Thanks to ShadowNet, companies and remote workers finally […]

Continue reading

Meltdown and Spectre: Apply software updates

This week, a set of vulnerabilities were disclosed that document fundamental flaws in most modern computer processors. Meltdown and Spectre flaws rely on an attacker being able to run arbitrary […]

Continue reading

New Releases: ShadowNet API & RAForce Assets Monitoring Panel

RiskAnalytics’ primary goal is to protect our customers. We believe that blocking, detection and visibility are key to that mission. This week, we made improvements to the ShadowNet Customer API […]

Continue reading

New router BotNet attempting to exploit Joomla Vulnerabilities

As of Monday September 11, RA Labs is tracking a nascent BotNet that appears to consist mostly of exploited routers. While it bears some similarity to other popular telnet “IoT” […]

Continue reading

The Human Firewall

Traditionally firewalls have been considered the edge of a network perimeter, and the first line of defense against cyber attacks. Firewalls, however, can only be as effective as the weakest […]

Continue reading

Andromeda command-and-control on SourceForge

by Seth Elo We are no strangers to online code repositories and social media being abused for malicious intents. Attackers will use services like these in hopes to make their malware harder to detect, […]

Continue reading