The Ultimate Guide to Ransomware
2024 edition
Overview
Ransomware is malware designed to virtually mimic the age-old crime of capturing items of value and demanding money for their safe return. Ransomware typically arrives via email or a backdoor, locks up valuable computer files, and is followed by a demand for compensation, often in Bitcoin or another cryptocurrency. The hacker promises a decryption tool on payment of the ransom – but there is never any guarantee of delivery or efficacy of the decryption tool.
Analyst reports
IDC MarketScape on ML
Canadian ISA Cybersecurity launches first UK operation ...
Thu, 28th Mar 2024
IDC on Firewall
Ransomware peaks as top threat in ANZ as study highligh...
Tue, 12th Mar 2024
IDC on Storage
Object First's Ootbi marks first anniversary with rapid...
Mon, 19th Feb 2024
IDC on Cyber attacks
Alarming surge in cyber attacks seen in Acronis report
Thu, 8th Feb 2024
Miercom on Malware
Check Point Infinity platform excels in Miercom's secur...
Wed, 7th Feb 2024
Expert columns
By Simon Howe of ExtraHop
There is no zero trust without network visibility
Last week
By Jonathan Tanner of Barracuda Networks, Inc.
The remote desktop tools most targeted by attackers in ...
Last week
By Andrew Rose of SoSafe
Building the cyber defences needed to ward off attacks
Last month
By Conan Bradley of Kordia
Rebuilding after ransomware – The case of The British L...
Last month
By Gabriel Moss of Barracuda Networks Inc
How attackers weaponise generative AI through data pois...
Last month
More expert columns
By Matt Caffrey of Barracuda Australia
How to defend your business against AI-powered ransomwa...
Last month
By Charles Smith of Barracuda Networks
Data tampering is an underrated threat — get your backu...
Mon, 25th Mar 2024
By Robin Long & Raj Samani of Rapid7
Why the external attack surface matters: An analysis in...
Fri, 22nd Mar 2024
By James Blake of Cohesity
One billion dollars in funding for even more ransomware
Fri, 23rd Feb 2024
By Christy Wyatt of Absolute Software
Cybersecurity is your defensive strategy, cyber resilie...
Fri, 16th Feb 2024
By Nick Turnbull of BeyondTrust
The role of Privilege Access Management in achieving ro...
Mon, 5th Feb 2024
Recent news
About Cyber Risk
Rise in cyber risks targeting third-party vulnerabiliti...
Yesterday
About Testing
NetSPI unveils unified platform bolstering proactive cy...
Yesterday
About Business Continuity
Absolute Security to reveal next-gen cyber resilience a...
Last week
About Endpoint Protection
Halcyon introduces Ransomware Warranty Program for enha...
Last week
About IT Training
Espionage breaches account for 25% in APAC, report reve...
Last week
More news
About Cyber Threats
Industrial sector sees 17% drop in ransomware attacks i...
Last week
About Cloud Services
Commvault launches Cloud Cleanroom for cyber attack rec...
Last week
About Firewall
Akamai Technologies unveils Guardicore platform for imp...
Last week
About Cloud Services
Akamai introduces Guardicore Platform to combat rising ...
Last week
About Cloud Services
Illumio included in prestigious Cyber 66 report for the...
Last week
Even more news
About Storage
Object First selects Vitanium for launch of ransomware-...
Last week
About Machine learning
Kaspersky boosts email security features after 77% of f...
Last week
About Machine learning
ExtraHop report shows Singapore firms vulnerable to ran...
Last month
About Cyber Threats
High Performance Podcast duo to keynote Infosecurity Eu...
Last month
About Data encryption
Ransomware threats escalating in Southeast Asia – repor...
Last month
Job moves
Move at NDI
KnowBe4 appoints Cindy Zhou as Chief Marketing Officer
Wed, 8th Nov 2023
Move at Palm
Illumio appoints Todd Palmer as Senior VP of Global Par...
Thu, 2nd Nov 2023
Move at Semperis
Former National Cyber Director Chris Inglis Joins Sempe...
Wed, 20th Sep 2023
Move at NDI
Vitali Edrenkine appointed Chief Marketing Officer at A...
Wed, 19th Jul 2023
Move at SAP
Illumio Names Gautam Mehandru as CMO
Wed, 5th Apr 2023
Other guides
You can read other related guides from Cybersecurity, Malware, Breach Prevention, Firewall, and Artificial Intelligence.
Powered by