Remove 2012 Remove Cyber Insurance Remove Cyber Risk Remove Risk
article thumbnail

The Surge of Double Extortion Ransomware Attacks

Pen Test

The 2012 Reveton ransomware famously used lock screen tactics claiming the FBI locked the computer for illegal activity. Double extortion introduces catastrophic risks of data breach and loss of customer trust if sensitive information gets leaked publicly. CryptoLocker, in 2013, pioneered the use of strong encryption algorithms.

article thumbnail

Top Cybersecurity Startups to Watch in 2022

eSecurity Planet

Boasting itself as the world’s first Code Risk Platform, Apiiro Security offers risk visibility across design, code, and cloud segments. Apiiro can connect across hybrid infrastructure through a read-only API and promises real-time inventory and actionable remediation for risks in addressing DevSecOps. Cowbell Cyber.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Vicarius Vulnerability management 2022 Private Dragos ICS and OT security 2021 Private Safeguard Cyber Risk management 2021 Private CyberGRX Risk management 2019 Private Signifyd Fraud protection 2018 Private RedOwl Security analytics 2015 Acquired: Forcepoint. AllegisCyber Investments.