<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/">

<channel>
	<title>ransomware | Business Upturn</title>
	<atom:link href="https://www.businessupturn.com/news/topic/ransomware/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.businessupturn.com</link>
	<description>India&#039;s leading business and financial news portal — markets, economy, stocks and corporate news.</description>
	<lastBuildDate>Tue, 27 Feb 2024 09:58:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.businessupturn.com/wp-content/uploads/2023/07/favicon-150x150.jpg</url>
	<title>ransomware | Business Upturn</title>
	<link>https://www.businessupturn.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>AI risks to security discussed in Parliament</title>
		<link>https://www.businessupturn.com/technology/cyber-security/ai-risks-to-security-discussed-in-parliament/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Tue, 27 Feb 2024 09:58:29 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[National security]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=404070</guid>

					<description><![CDATA[Experts at the UK Parliament discussed concerns about AI, including deepfakes, AI-powered hacking, and evolving ransomware threats. They called for addressing the cybersecurity skills gap, developing AI defenses, and proactive data protection.]]></description>
										<content:encoded><![CDATA[&lt;p data-sourcepos=&quot;3:1-3:279&quot;&gt;The potential dangers of Artificial Intelligence (AI) to national security were at the forefront of discussions held in the UK Parliament recently. Leading figures from the British cybersecurity industry gathered to address the evolving threat landscape and brainstorm solutions.&lt;/p&gt;
&lt;p data-sourcepos=&quot;5:1-5:634&quot;&gt;The event, hosted by Member of Parliament Dean Russell and chaired by Steven George-Hilley of Centropy PR, featured a panel of experts who delved into the specific risks posed by AI advancements. These concerns ranged from the potential misuse of AI-generated deepfakes for malicious purposes, such as spreading misinformation or manipulating public opinion, to the increased sophistication of AI-powered hacking tools that could target critical national infrastructure. The rise of ransomware attacks, a growing threat in recent years, was also highlighted as likely to become even more complex with the integration of AI technology.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:638&quot;&gt;Beyond outlining the potential problems, the panel also emphasized the crucial need for proactive measures to address these emerging challenges. Victor Murineanu, CISO of Chelsea Football Club, underlined the importance of bridging the growing cyber skills gap in the UK. He called for increased investment in training and recruitment programs to equip young people with the necessary expertise to combat these future threats. This call to action resonated with cyber security specialist Sarah Rench from Avanade, who observed a positive trend of companies allocating more resources towards developing cyber skills within their workforce.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:441&quot;&gt;Nicko van Someren, the Chief Technology Officer of Absolute Software, emphasized the crucial role of staying ahead of the curve. He pointed out that the rapid advancements in AI not only pose new challenges but also present opportunities for strengthening defenses. He stressed the urgency of utilizing these advancements for defensive purposes, acknowledging that malicious actors are likely already exploring the offensive potential of AI.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:683&quot;&gt;The discussion also highlighted the importance of maintaining comprehensive visibility into IT systems. Paul Connaghan, a Principal Consultant specializing in application security at RiverSafe, argued that in the face of increasingly sophisticated threats like AI-powered attacks, having clear visibility into network activity, user behavior, and system performance is no longer optional but essential for building effective defensive strategies. He emphasized that investing in robust threat intelligence solutions that provide real-time insights is crucial for businesses to proactively identify and mitigate potential threats, ultimately protecting themselves and their employees.&lt;/p&gt;
&lt;p data-sourcepos=&quot;13:1-13:591&quot;&gt;The conversation also touched upon the need to anticipate future threats. Angus Lockhart, Chief Operating Officer at SECQAI, pointed out the escalating complexity of the cyber landscape, which he linked to rising global tensions and conflicts. He stressed the importance of ensuring the UK’s preparedness against both current and future threats. This, he suggested, involves mitigating existing cyber attacks by promoting the use of “memory safe” hardware and preparing for future threats like quantum computing by transitioning to Post-Quantum Cryptography, a more secure encryption method.&lt;/p&gt;
&lt;p data-sourcepos=&quot;15:1-15:418&quot;&gt;Finally, Nithin Thomas, Founder and CEO of Klarytee, emphasized the transformative potential of AI while simultaneously cautioning against its potential misuse. He warned that as businesses embrace AI’s capabilities, a new wave of cyber threats, powered by AI, is likely to emerge. He concluded by underlining the critical need for a proactive approach to data protection in the face of this evolving threat landscape.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/AI-risks-to-security-discussed-in-Parliament.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[AI risks to security discussed in Parliament]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/AI-risks-to-security-discussed-in-Parliament.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Lockbit claims resurgence after global police takedown</title>
		<link>https://www.businessupturn.com/technology/cyber-security/lockbit-claims-resurgence-after-global-police-takedown/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Tue, 27 Feb 2024 03:17:29 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[LockBit]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Vigilance]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=403887</guid>

					<description><![CDATA[Lockbit, recently disabled by law enforcement, claims to be back online. Authorities maintain the group is compromised and emphasize ongoing efforts to disrupt their activities.]]></description>
										<content:encoded><![CDATA[&lt;p data-sourcepos=&quot;1:1-1:232&quot;&gt;In a surprising turn of events, the notorious cybercrime group Lockbit, known for its use of ransomware to extort victims, claims to be operational again following a recent international takedown effort by law enforcement agencies.&lt;/p&gt;
&lt;p data-sourcepos=&quot;3:1-3:259&quot;&gt;Earlier in February, a coordinated operation led by the United Kingdom’s National Crime Agency (NCA) targeted Lockbit. This unprecedented effort resulted in arrests, indictments, and the seizure of the group’s infrastructure, effectively taking them offline.&lt;/p&gt;
&lt;p data-sourcepos=&quot;5:1-5:430&quot;&gt;However, in a recent statement, Lockbit asserts that they have restored their servers and are back in business. They claim their “backup blogs,” which are believed to be alternative platforms for leaking stolen data from victims, were unaffected by the takedown due to their use of a different programming language. This statement, posted on a newly established dark website, further asserts that stolen data leaks will continue.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:358&quot;&gt;The NCA, however, disputes Lockbit’s claims. They maintain that the group remains “completely compromised” and emphasize their ongoing efforts to disrupt Lockbit’s activities. Additionally, they acknowledge the possibility of the group attempting to rebuild and regroup, highlighting the vast amount of intelligence gathered about Lockbit and its associates.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:358&quot;&gt;While the group claims partial functionality, the effectiveness of the police operation and the extent of Lockbit’s capabilities are still under investigation. Cybersecurity experts continue to advise organizations to remain vigilant and implement robust defenses against the ever-present threat of ransomware attacks.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/Lockbit-claims-resurgence-after-global-police-takedown.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Lockbit claims resurgence after global police takedown]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/Lockbit-claims-resurgence-after-global-police-takedown.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Indian businesses face urgent need to bolster cybersecurity amidst rising AI-driven threats</title>
		<link>https://www.businessupturn.com/technology/cyber-security/indian-businesses-face-urgent-need-to-bolster-cybersecurity-amidst-rising-ai-driven-threats/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Sun, 25 Feb 2024 14:08:05 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Cyberattacks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[GenAI]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=403585</guid>

					<description><![CDATA[Indian firms must step up cybersecurity efforts as AI-powered attacks rise. Experts urge AI-based defenses, training, and collaboration for a secure digital future.]]></description>
										<content:encoded><![CDATA[&lt;p&gt;In the ever-evolving realm of cybersecurity, complacency can be a costly mistake. As cyber criminals continuously adapt and exploit new technologies, Indian organizations must remain vigilant and proactive in safeguarding their digital assets. Experts are urging Indian organizations to shed complacency and actively bolster their cybersecurity measures in the face of increasingly frequent and complex cyberattacks. New technologies like artificial intelligence (AI) offer exciting possibilities but also introduce fresh challenges to the cybersecurity landscape.&lt;/p&gt;
&lt;p&gt;Dr. Sanjay Katkar, Joint Managing Director of Quick Heal Technologies, aptly describes AI in cybersecurity as a “double-edged sword.” While it empowers defensive capabilities, malicious actors can exploit it too.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:386&quot;&gt;However, not all hope is lost. Dr. Katkar assures us that certain detection technologies remain exclusive to cybersecurity professionals, offering a critical line of defense for critical digital infrastructure and anomaly detection. This is further underscored by research conducted by Seqrite Labs, which analyzed a staggering 400 million malware detections in India alone during 2023.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:388&quot;&gt;The financial repercussions of cyberattacks are equally concerning. A recent report by Barracuda Networks reveals that the average annual cost of responding to such incidents exceeds a staggering $5 million. Moreover, the report raises concerns about the potential use of Generative AI (GenAI) by hackers, further amplifying the volume, sophistication, and effectiveness of their attacks. In the face of this evolving threat landscape, experts propose a multi-pronged approach. Deploying AI-based defenses specifically tailored to counter these emerging threats is deemed essential.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:388&quot;&gt;Additionally, Raj Sivaraju, President of APAC at Arete, emphasizes the importance of implementing ethical frameworks to govern AI development and cyber use cases, potentially mitigating potential damage. Regular software updates, access isolation, and ongoing user training against evolving social engineering techniques are also highlighted as crucial measures.&lt;/p&gt;
&lt;p data-sourcepos=&quot;13:1-13:272&quot;&gt;Looking ahead, 2024 demands a proactive approach from Indian firms. Expanding training programs, fostering security partnerships, embracing automation, and implementing resilience principles like “zero trust” are identified as priorities for maturing defensive strategies. By embracing urgency, collaboration, and strategic technology investments, Indian cyber defenders can effectively confront the challenges posed by their adversaries and contribute to a more secure digital future.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/Indian-businesses-face-urgent-need-to-bolster-cybersecurity-amidst-rising-AI-driven-threats.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Indian businesses face urgent need to bolster cybersecurity amidst rising AI-driven threats]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/Indian-businesses-face-urgent-need-to-bolster-cybersecurity-amidst-rising-AI-driven-threats.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>North Korean hackers leverage AI, raising global cybersecurity concerns</title>
		<link>https://www.businessupturn.com/technology/cyber-security/north-korean-hackers-leverage-ai-raising-global-cybersecurity-concerns/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Sun, 25 Feb 2024 03:35:15 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[generative AI]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=403067</guid>

					<description><![CDATA[North Korea&apos;s AI-powered cyberattacks demand global cooperation, robust AI defenses, and responsible AI development for effective countermeasures.]]></description>
										<content:encoded><![CDATA[&lt;p data-sourcepos=&quot;3:1-3:373&quot;&gt;North Korean hackers, long notorious for their audacious cyberattacks, have taken their game to the next level by incorporating generative artificial intelligence (AI) into their operations. This development, reported by security experts and intelligence agencies, marks a concerning escalation in the sophistication and potential impact of North Korea’s cyber threats.&lt;/p&gt;
&lt;p data-sourcepos=&quot;5:1-5:624&quot;&gt;Previously known for brazen attacks like the Bangladesh central bank heist and the WannaCry ransomware epidemic, North Korean hackers are now leveraging AI’s power to create more convincing online personas and tailor phishing campaigns with unprecedented precision. Imagine receiving a LinkedIn message from a seemingly legitimate recruiter, only to discover later it was a meticulously crafted AI-generated profile designed to steal your credentials. This is the reality that cybersecurity professionals now face, with the added complexity of AI-powered attacks blurring the lines between human and machine interaction.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:638&quot;&gt;The integration of AI raises several critical concerns. Firstly, it facilitates targeted espionage and financial theft, potentially fueling North Korea’s nuclear weapons program. The ability to bypass language barriers and generate realistic documents enables hackers to infiltrate sensitive networks and steal valuable information, intellectual property, and funds. Secondly, it complicates global cybersecurity efforts. Identifying and neutralizing AI-powered attacks requires advanced detection algorithms and constant adaptation, posing a significant challenge for defense systems designed to combat traditional cyber threats.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:499&quot;&gt;The report by the National Intelligence Service further highlights North Korea’s ambitious AI development, encompassing government, academic, and commercial sectors. This comprehensive approach suggests a strategic focus on leveraging AI across various domains, including public health, nuclear safety, and military simulations. While some private entities claim to have integrated AI into their surveillance systems, the true extent of North Korea’s AI capabilities remains shrouded in secrecy.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:458&quot;&gt;The arms race in the cybersecurity realm is intensifying, with both defense and offense adopting AI tools. While machine learning algorithms traditionally aided in identifying suspicious network activity, offensive actors are now exploring large language models like ChatGPT to automate and personalize attacks. This dual-use nature of AI underscores the need for responsible development and deployment, ensuring its benefits outweigh the potential harm.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:458&quot;&gt;Enhanced international cooperation is crucial to share intelligence, develop robust AI-powered defense systems, and establish clear norms for responsible AI development. Additionally, continued investment in research and development is essential to stay ahead of the curve and ensure effective countermeasures against AI-powered cyberattacks.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/North-Korean-hackers-leverage-AI-raising-global-cybersecurity-concerns.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[North Korean hackers leverage AI, raising global cybersecurity concerns]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/North-Korean-hackers-leverage-AI-raising-global-cybersecurity-concerns.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Healthcare billing disruption caused by Optum hack</title>
		<link>https://www.businessupturn.com/technology/cyber-security/healthcare-billing-disruption-caused-by-optum-hack/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Fri, 23 Feb 2024 17:24:08 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[america]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=402839</guid>

					<description><![CDATA[Optum hack hit US healthcare, shutting billing &amp; claims for hospitals, clinics &amp; pharmacies. ]]></description>
										<content:encoded><![CDATA[&lt;p data-sourcepos=&quot;3:1-3:428&quot;&gt;The American healthcare system was sent into disarray on February 21st, 2024, as a cyberattack targeted Optum, a subsidiary of UnitedHealth Group. Optum operates the Change Healthcare platform, a crucial cog in the nation’s medical billing and claims processing machinery. The attack forced Optum to shut down its IT systems, causing widespread disruptions that impacted hospitals, clinics, pharmacies, and ultimately, patients.&lt;/p&gt;
&lt;p data-sourcepos=&quot;5:1-5:434&quot;&gt;The attack, believed to be perpetrated by a “nation-state” actor, highlights the vulnerabilities of the healthcare industry in the face of sophisticated cyber threats. Optum confirmed the incident in an official filing with the Securities and Exchange Commission, stating that they proactively isolated impacted systems to contain the attack and protect patient data. However, the disruption’s full extent and duration remain unclear.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:477&quot;&gt;The immediate consequences were widespread. Hospitals and clinics struggled to process patient bills and claims, leading to delays in treatment and prescriptions. Pharmacies, particularly local and chain stores, were unable to process insurance claims or accept discount cards, creating significant inconvenience for patients. The American Hospital Association issued a stark warning, urging healthcare organizations to disconnect from Optum until its systems were deemed safe.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:446&quot;&gt;The potential for a ransomware attack looms large, with the possibility of patient and corporate data being stolen and held for ransom. While the investigation continues, the incident raises critical questions about data security and preparedness within the healthcare industry. The reliance on centralized platforms like Change Healthcare underscores the need for robust cybersecurity measures and contingency plans to mitigate such disruptions.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:446&quot;&gt;The investigation into the cyberattack is ongoing, with authorities yet to disclose the full extent of the damage. However, the initial impact has been significant, highlighting the vulnerabilities within the US healthcare system’s digital infrastructure. This incident underscores the need for robust cybersecurity measures and contingency plans to ensure the continued functionality of critical healthcare services in the face of such threats.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/Healthcare-billing-disruption-caused-by-Optum-hack.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Healthcare billing disruption caused by Optum hack]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/Healthcare-billing-disruption-caused-by-Optum-hack.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>India ranks 80th in local cyber threats despite booming $6 billion cybersecurity market</title>
		<link>https://www.businessupturn.com/technology/cyber-security/india-ranks-80th-in-local-cyber-threats-despite-booming-6-billion-cybersecurity-market/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Wed, 21 Feb 2024 15:29:37 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Cyber threats]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Data breaches]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=401675</guid>

					<description><![CDATA[India&apos;s digital space battles local threats (34%) while the market booms. Sophisticated attacks push businesses to outsource security for AI &amp; digital payments, ensuring a secure future.]]></description>
										<content:encoded><![CDATA[&lt;p data-sourcepos=&quot;3:1-3:533&quot;&gt;A recent report has shed light on India’s cybersecurity landscape, revealing a concerning trend of local cyber threats targeting internet users. The report, which focused on threats found directly on users’ devices or removable media, placed India at the 80th position globally. This means that a significant portion of Indian internet users faced local threats in 2023, with nearly 34% encountering such malicious programs. These threats can take various forms, including malware hidden within complex installers or encrypted files.&lt;/p&gt;
&lt;p data-sourcepos=&quot;5:1-5:393&quot;&gt;Despite the prevalence of local threats, India’s cybersecurity market is booming, reaching a staggering USD 6.06 billion in 2023. However, experts warn that sophisticated external cyber threats pose a major challenge for businesses. In response, nearly two-thirds of Indian enterprises are planning to outsource key security tasks to managed security service providers in the next three years. Establishing and maintaining trust in the digital realm becomes increasingly difficult when sophisticated attacks threaten to breach data and disrupt operations.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:577&quot;&gt;Recognizing this challenge, a significant trend is emerging within Indian enterprises. Nearly two-thirds, or 67%, are considering outsourcing key security tasks to managed service providers (MSSPs) in the coming years. This shift signifies a growing understanding of the complexities involved in managing cybersecurity, and the potential benefits of leveraging specialized expertise. By partnering with MSSPs, organizations can gain access to advanced security solutions and skilled personnel, allowing them to focus on their core business functions with greater peace of mind.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:577&quot;&gt;Furthermore, the adoption of artificial intelligence (AI) and digital payments in India adds another layer of complexity to the cybersecurity landscape. As Jaydeep Singh, General Manager for South Asia at Kaspersky, aptly points out, “With the rise of AI use and the consistent digital payment adoption here, it has become imperative for organisations to continuously improve their cybersecurity posture to protect their assets and maintain stakeholder trust.” The integration of AI and digital payments necessitates robust security measures to safeguard sensitive data and prevent financial losses.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:577&quot;&gt;While the market is flourishing and awareness is increasing, the persistent threat of local and external cyber attacks necessitates continuous vigilance and improvement.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/India-ranks-80th-in-local-cyber-threats-despite-booming-6-billion-cybersecurity-market.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[India ranks 80th in local cyber threats despite booming $6 billion cybersecurity market]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/India-ranks-80th-in-local-cyber-threats-despite-booming-6-billion-cybersecurity-market.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>International law enforcement dismantles LockBit ransomware gang</title>
		<link>https://www.businessupturn.com/technology/cyber-security/international-law-enforcement-dismantles-lockbit-ransomware-gang/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Tue, 20 Feb 2024 17:29:46 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Boeing]]></category>
		<category><![CDATA[Cyberattack]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[LockBit]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=400812</guid>

					<description><![CDATA[International law enforcement disrupts the LockBit ransomware gang, seizing domains and crippling their infrastructure.]]></description>
										<content:encoded><![CDATA[&lt;p&gt;In a significant blow to the global cybercrime landscape, a coalition of international law enforcement agencies, led by the FBI and the UK National Crime Agency, has successfully disrupted the operations of the notorious LockBit ransomware gang. This coordinated effort, involving authorities from 11 countries, dealt a crippling strike to LockBit’s infrastructure, seizing control of its website and shutting down 11,000 domains used by the group and its affiliates to facilitate their ransomware attacks.&lt;/p&gt;
&lt;p&gt;LockBit, notorious for its brutal tactics and high-profile targets, has plagued the digital landscape for several years. Their modus operandi involves deploying ransomware, a type of malicious software that encrypts victims’ data, rendering it inaccessible. They then demand exorbitant sums of money in exchange for decryption keys, inflicting significant financial losses and operational disruptions on businesses and organizations.&lt;/p&gt;
&lt;p data-sourcepos=&quot;5:1-5:463&quot;&gt;The operation targeted the core infrastructure of LockBit, seizing control of over 11,000 domains used by the group and its affiliates for facilitating ransomware activities. This included taking down the LockBit website, and effectively severing their primary communication channel with potential victims and collaborators. Additionally, law enforcement officials disrupted LockBit’s malware deployment system, further hindering their capacity to launch new attacks.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:550&quot;&gt;Notably, LockBit was behind the 2023 attack on the U.S. arm of the Industrial &amp; Commercial Bank of China, causing significant disruption to the U.S. Treasury market, and also compromised a website used by Boeing to sell spare parts and services.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:301&quot;&gt;The group’s operations are estimated to have netted millions in ransom payments, with the FBI reporting over 144 million dollars extorted from victims in the United States alone. LockBit’s reach extended beyond national borders, claiming over 3,600 victims globally, primarily from the private sector.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:377&quot;&gt;The successful disruption of LockBit marks a significant victory in the ongoing fight against cybercrime. It demonstrates the power of international cooperation and coordinated action in tackling sophisticated cyber threats. Furthermore, the action encourages victims of cyberattacks to come forward and report them to law enforcement authorities.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/International-law-enforcement-dismantles-LockBit-ransomware-gang.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[International law enforcement dismantles LockBit ransomware gang]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/International-law-enforcement-dismantles-LockBit-ransomware-gang.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>The growing threat of cybercrime in Africa</title>
		<link>https://www.businessupturn.com/technology/cyber-security/the-growing-threat-of-cybercrime-in-africa/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Tue, 20 Feb 2024 04:19:51 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Africa]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Data breaches]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=400533</guid>

					<description><![CDATA[Africa witnesses a surge in cyberattacks, becoming a top target for criminals leveraging ransomware, DoS attacks, and sophisticated tactics.]]></description>
										<content:encoded><![CDATA[&lt;p data-sourcepos=&quot;3:1-3:138&quot;&gt;The META region, encompassing the Middle East, Turkey, and Africa, faces a relentless barrage of cyberattacks. But within this region, Africa has emerged as the prime target for malicious actors, raising concerns about the continent’s digital security and the potential ramifications for individuals, businesses, and governments.&lt;/p&gt;
&lt;p data-sourcepos=&quot;5:1-5:61&quot;&gt;Dr. Amin Hasbini, head of the Global Research &amp; Analysis Team (GReAT) for the META region at Kaspersky, paints a stark picture. For instance, Kenya, South Africa, and Nigeria witnessed a staggering 41 million, 33 million, and 21 million cyberattacks in the past year alone. This alarming trend isn’t just about quantity; it’s also about the nature of the threats. Ransomware, notorious for encrypting files and demanding hefty ransoms for decryption, has reigned supreme for three consecutive years, with file encryption as its preferred weapon.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:71&quot;&gt;However, the threat landscape is undergoing a dynamic shift. While some countries grapple with intensified ransomware attacks, others face a surge in Denial-of-Service (DoS) threats, aiming to disrupt online services. This evolving tactic highlights the adaptability of cybercriminals, constantly seeking new avenues to exploit vulnerabilities.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:495&quot;&gt;The very nature of the criminal underground is transforming. Dr. Hasbini emphasizes the rapid growth and interconnectedness of these networks, allowing them to flourish and pose an even greater threat. These actors no longer discriminate; they target everyone – individuals, families, and even children. Their methodologies and technologies are constantly evolving, and they readily collaborate and compete, further exacerbating the problem.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:282&quot;&gt;Adding another layer of concern is the recent discovery of certain cybercriminals possessing “Zero-Day” exploits, granting them unprecedented access to systems with no known defenses. This highlights the sophistication and alarming capabilities these malicious actors are attaining.&lt;/p&gt;
&lt;p data-sourcepos=&quot;13:1-13:20&quot;&gt;The scale of attacks is also escalating, threatening to overwhelm defenses. The “Raysida” attack on a South African educational institution in January serves as a chilling example. This attack compromised a staggering 500 gigabytes of data, equivalent to 500,000 large Excel files, exposing a vast amount of personal and confidential information. Such incidents underscore the potential severity of cyberattacks in Africa.&lt;/p&gt;
&lt;p data-sourcepos=&quot;15:1-15:526&quot;&gt;Advanced persistent threats (APTs), characterized by stealthy and prolonged intrusion attempts, are also gaining traction. These targeted attacks primarily focus on government, telecommunications, financial, and industrial sectors, posing a significant challenge to regional stability and economic well-being. Dr. Hasbini emphasizes the particular vulnerability of government institutions due to the rapid digital transformation sweeping across Africa, a trend that, while bringing advancements, also creates exploitable gaps.&lt;/p&gt;
&lt;p data-sourcepos=&quot;15:1-15:526&quot;&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/The-growing-threat-of-cybercrime-in-Africa.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[The growing threat of cybercrime in Africa]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/The-growing-threat-of-cybercrime-in-Africa.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>North Korea’s cyber army plunders billions in virtual currency</title>
		<link>https://www.businessupturn.com/technology/cyber-security/north-koreas-cyber-army-plunders-billions-in-virtual-currency/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Sat, 17 Feb 2024 14:35:12 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Lazarus]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=399773</guid>

					<description><![CDATA[North Korean hackers steal billions in virtual currency to fund nuclear programs, highlighting the need for stricter regulations, international cooperation, and enhanced cyber defenses.]]></description>
										<content:encoded><![CDATA[&lt;p&gt;Within the digital world, a group known as Andariel, a North Korean hacker unit, alongside others like Kimsuky, Lazarus, and BlueNoroff, has become notorious for its focus on financial cybercrime. Their recent exploits, however, have shed light on a larger, more troubling trend: North Korea’s growing reliance on virtual currency theft to fund its nuclear weapons of mass destruction (WMD) programs.&lt;/p&gt;
&lt;p&gt;News of Andariel’s breach of South Korean defence firms, stealing 1.2 terabytes of sensitive data, was just the tip of the iceberg. A recent report by the U.S. Department of the Treasury reveals a more alarming reality: North Korean cybercriminals have allegedly amassed a staggering $1.7 billion in virtual assets through cyber thefts in 2022 alone, exceeding any previous year. This brings the total stolen over the past three years to a staggering $3.129 billion.&lt;/p&gt;
&lt;p&gt;According to the report, North Korean cyber criminals amassed a staggering $1.7 billion in virtual assets through cyber theft in 2022 alone, exceeding any previous year. This brings the total stolen over the past three years to a staggering $3.129 billion. This illicit activity takes various forms, including ransomware attacks, hacks on virtual asset service providers (VASPs), and even the deployment of IT experts overseas who operate under assumed identities to secure contracts on digital platforms.&lt;/p&gt;
&lt;p&gt;No longer content with isolated attacks, they are now building a network of international collaborators, with evidence suggesting ties to Russian cybercriminals who provide haven and support. This collaboration raises the spectre of even more sophisticated and coordinated attacks in the future.&lt;/p&gt;
&lt;p&gt;The vulnerability of virtual assets plays a crucial role in North Korea’s success. The rapid growth of the cryptocurrency market, coupled with a lack of robust regulations, creates a fertile ground for exploitation. Hackers capitalize on weak security measures and the anonymity offered by certain platforms to steal and launder funds with relative ease.&lt;/p&gt;
&lt;p&gt;This growing threat has not gone unnoticed by the international community. The United Nations Security Council has imposed sanctions on North Korea since 2006, and a trilateral effort by South Korea, the United States, and Japan aims to curb virtual asset theft. However, these efforts have been met with adaptation by North Korean hackers, who operate from foreign shores and meticulously mask their identities.&lt;/p&gt;
&lt;p&gt;With billions already stolen and North Korea’s nuclear ambitions unabated, the international community must act swiftly. Strategies like enhanced cyber security measures, stricter regulations for virtual asset markets, and closer international cooperation are crucial to dismantle North Korea’s cybercrime network and prevent further funding of its WMD programs.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/North-Koreas-cyber-army-plunders-billions-in-virtual-currency.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[North Korea’s cyber army plunders billions in virtual currency]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/North-Koreas-cyber-army-plunders-billions-in-virtual-currency.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>U.S. firm CEO says up to 1,500 businesses affected by ransomware attack</title>
		<link>https://www.businessupturn.com/technology/cyber-security/u-s-firm-ceo-says-up-to-1500-businesses-affected-by-ransomware-attack/</link>
		
		<dc:creator><![CDATA[Vaibhav Agrawal]]></dc:creator>
		<pubDate>Tue, 06 Jul 2021 05:37:17 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=120934</guid>

					<description><![CDATA[Around 1,500 businesses&apos; data were breached by a ransomware attack on Friday and the hackers have demanded $70 million to restore the data.]]></description>
										<content:encoded><![CDATA[&lt;p&gt;According to a report released by Reuters, due to a ransomware attack centered on the United States information technology firm Kaseya, around 800 to 1500 businesses across the world have been affected, as mentioned by its Chief Executive Officer on Monday.&lt;/p&gt;
&lt;p&gt;It was difficult to estimate the precise impact of Friday’s attack because those who were hit were major customers of Kaseya’s customers, As mentioned by the Florida-based company’s CEO Fred Voccola in an interview.&lt;/p&gt;
&lt;p&gt;The company typically handles the back-office work for those companies which are too small or modestly resourced for having their Tech departments are provided software tools by Kaseya.&lt;/p&gt;
&lt;p&gt;Allowing the hackers to paralyze hundreds of businesses situated on all five continents, on Friday one of those tools was subverted. Small concerns like dentists’ offices or accountants were among the most of those who affected, while the disruption has been felt more keenly in Sweden where due to cash registers going inoperative, hundreds of supermarkets had to close along with New Zealand, where schools and kindergartens were knocked offline.&lt;/p&gt;
&lt;p&gt;Although a willingness to temper the demands made by the hackers in private conversations with the cybersecurity expert and with Reuters has been indicated by the hackers who, to restore all the affected businesses data have demanded $70 million and claim the responsibility for the breach.&lt;/p&gt;
&lt;p&gt;On Monday Reuters was told by a representative of the hackers that they are always ready to negotiate. Although the representative didn’t provide their name but spoke through a chat interface on the hacker’s website.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2021/07/0001-3899088909_20210706_103253_0000.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[U.S. firm CEO says up to 1,500 businesses affected by ransomware attack]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2021/07/0001-3899088909_20210706_103253_0000.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Ransomware attacks in India increased 200% quarter-on-quarter in April-June: Seqrite Report</title>
		<link>https://www.businessupturn.com/technology/cyber-security/ransomware-attacks-in-india-increased-200-quarter-on-quarter-in-april-june-seqrite-report/</link>
		
		<dc:creator><![CDATA[Anjana Krishna]]></dc:creator>
		<pubDate>Wed, 26 Aug 2020 12:53:32 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=38356</guid>

					<description><![CDATA[Ransomware attacks in India doubled in the June quarter according to cybersecurity firm Seqrite’s quarterly threat report. Almost 4 lakh...]]></description>
										<content:encoded><![CDATA[&lt;p&gt;Ransomware attacks in India doubled in the June quarter according to cybersecurity firm Seqrite’s quarterly threat report. Almost 4 lakh ransomware cases were reported in the April-June quarter, witnessing a large spike from the last quarter.&lt;/p&gt;
&lt;p&gt;Seqrite detected 22 million Windows malware in June quarter. Out of these, 9.59 million attacks were in June alone, up from 7.51 million in May. As many as 100 enterprises have been affected by the Maze ransomware, which has emerged as the biggest ransomware threat according to the researchers.  Ryuk, Netwalker, RagnarLocker, PonyFinal and Tycoon are the other ransomware families that saw increased activity since the pandemic started. Absence of a good cybersecurity system attributed to the work from home situation is the reason behind the spike in the ransomware attacks, said the report.&lt;/p&gt;
&lt;p&gt;The recent attacks also saw ransomware operators stealing sensitive information apart from encrypting company systems and asking for ransom, which is a troublesome development.&lt;span style=&quot;text-transform: initial&quot;&gt; &lt;/span&gt;&lt;span style=&quot;text-transform: initial&quot;&gt;BFSI, Manufacturing, IT/ITES and Government departments are the most targeted because of the sensitive information they possess.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;text-transform: initial&quot;&gt;“Ransomware attacks have always been a concern for enterprises. But what makes them more dangerous is their innovative and evolving nature. While previously, threat actors used to block sensitive data and ask for a ransom in return, now they have evolved and become much smarter than ever,” Sanjay Katkar, Joint Managing Director and CTO – Quick Heal Technologies said in a statement. &lt;/span&gt;Manufacturing and professional services were the most affected sectors with 23.86% and 23.54% detection.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2020/08/Untitled-design-41-3.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Ransomware attacks in India increased 200% quarter-on-quarter in April-June: Seqrite Report]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2020/08/Untitled-design-41-3.jpg" width="1200" height="675" />
	</item>
	</channel>
</rss>
