Akira Exploits the Gaps Between Patching and Identity Security

Coveware by Veeam experts have observed a sharp rise in Akira ransomware cases, with more than 40 of those incidents tied to a single exploitation pathway. At the center of these cases is a recently mitigated VPN vulnerability in widely deployed enterprise appliances, which Akira has been actively exploiting to gain initial access. What makes this surge particularly concerning is that many of the victim organizations had already applied the vendor’s patch. Read more
Raymond Umerley
Raymond Umerley

Field CISO

Encryption in Real Time: What Really Happens During a Ransomware Attack

It starts like any other morning — except for the IT admin, who logs in first. You check the monitoring dashboard and see a few alerts: elevated CPU usage, a couple of failed logins, then a string of disconnected endpoints. At first, it looks like routine noise. Maybe a patch failed overnight. Maybe a script hung. Read more
Raymond Umerley
Raymond Umerley

Field CISO

Coveware by Veeam Cyber Extortion Readiness & Response Retainer

Purpose-Built Expertise for Ransomware and Cyber Extortion

Ransomware and cyber extortion are more than security incidents; they are full-scale business crises. When operations halt and leadership demands answers, you need more than generalist DFIR. You need a partner fluent in high-stakes ransomware extortion.

Coveware by Veeam offers a dedicated Incident Response Retainer focused exclusively on ransomware and cyber extortion. Built to strengthen preparedness before an incident and accelerate response during one, Coveware reduces downtime, lowers costs, and restores clarity and control when it matters most.

Why Coveware? Strategic Value from Day One

A Partner Committed to Avoiding Payment

Our foundational principle: If you can avoid paying, you should.

Coveware builds recovery confidence so clients can walk away. When payment is unavoidable, we shorten timelines, cut ransom ... Read more

Raymond Umerley
Raymond Umerley

Field CISO

Top 5 TTPs Targeting Enterprise Cybersecurity

As enterprises continue to strengthen their security tactics, threat actors are continuously refining their methods to sidestep them. In 2024, advanced tactics, techniques, and procedures (TTPs) evolved significantly, shaping the threat landscape with greater efficiency and effectiveness. These advancements have intensified enterprise cybersecurity threats, making proactive defense strategies more critical than ever.

With the dust now settled, let’s look at the TTPs most frequently leveraged against enterprises, which proved most impactful, and how enterprises can detect these threats before it’s too late.

TTPs Targeting Enterprises Today

1. Exfiltration

The concept behind data extortion attacks is straightforward: steal sensitive data and use it as ransom leverage. Threat actors have evolved beyond traditional encryption-based attacks, finding new avenues ... Read more

Raymond Umerley
Raymond Umerley

Field CISO