Weekly Security Update – May 1st
Ransomware has been a dominant threat to organizations for several years now, causing damage estimated to be in the billions of dollars. Increasingly, a common action carried out by ransomware attacks is to erase the volume backups (i.e., shadow copies), thereby preventing victims from being able to recover any files that had been encrypted.
Defenders must be vigilant to stay ahead of the bad guys and, when needed, adapt their detection methodologies and capabilities. Moreover, conducting offensive research is just as important to defenders as it is to attackers in order to stay ahead of the curve.
Call or email us to have a threat assessment performed @ 971.331.4871 / sales@pdxittech.com
Get In Touch
Share On Social Media
Other Recent Blog Articles
Apple Addresses Critical Zero-Day Vulnerabilities Affecting Intel-Based Macs
Apple has addressed two critical zero-day vulnerabilities that were actively exploited by attackers to target Intel-based Macs. The flaws resided in macOS Sequoia’s JavaScriptCore (CVE-2024-44308) and WebKit (CVE-2024-44309) components. The…
Read MoreElevating Small Businesses, One Tech Solution at a Time
PDX IT Services, led by industry veteran Steve Shaff, is dedicated to rescuing small businesses from IT chaos. With over 25 years of experience working with Fortune 500 companies and…
Read MorePart 2 with our special guest Victoria Dean – Story Time with Victoria Dean
Join us for Part 2 of our Breaking Down I.T. podcast as we sit down with Victoria Dean, a seasoned IT professional from TAK Consulting. In this episode, we dive…
Read More