The Ultimate Guide to Ransomware
2024 edition
Overview
Ransomware is malware designed to virtually mimic the age-old crime of capturing items of value and demanding money for their safe return. Ransomware typically arrives via email or a backdoor, locks up valuable computer files, and is followed by a demand for compensation, often in Bitcoin or another cryptocurrency. The hacker promises a decryption tool on payment of the ransom – but there is never any guarantee of delivery or efficacy of the decryption tool.
Analyst reports
IDC MarketScape on ML
Canadian ISA Cybersecurity launches first UK operation ...
Thu, 28th Mar 2024
IDC on Firewall
Ransomware peaks as top threat in ANZ as study highligh...
Tue, 12th Mar 2024
IDC on Storage
Object First's Ootbi marks first anniversary with rapid...
Mon, 19th Feb 2024
IDC on Cyber attacks
Alarming surge in cyber attacks seen in Acronis report
Thu, 8th Feb 2024
Miercom on Malware
Check Point Infinity platform excels in Miercom's secur...
Wed, 7th Feb 2024
Expert columns
By Jonathan Tanner of Barracuda Networks, Inc.
The remote desktop tools most targeted by attackers in ...
Yesterday
By Andrew Rose of SoSafe
Building the cyber defences needed to ward off attacks
Last month
By Conan Bradley of Kordia
Rebuilding after ransomware – The case of The British L...
Last month
By Gabriel Moss of Barracuda Networks Inc
How attackers weaponise generative AI through data pois...
Last month
By Matt Caffrey of Barracuda Australia
How to defend your business against AI-powered ransomwa...
Last month
More expert columns
By Charles Smith of Barracuda Networks
Data tampering is an underrated threat — get your backu...
Mon, 25th Mar 2024
By Robin Long & Raj Samani of Rapid7
Why the external attack surface matters: An analysis in...
Fri, 22nd Mar 2024
By James Blake of Cohesity
One billion dollars in funding for even more ransomware
Fri, 23rd Feb 2024
By Christy Wyatt of Absolute Software
Cybersecurity is your defensive strategy, cyber resilie...
Fri, 16th Feb 2024
By Nick Turnbull of BeyondTrust
The role of Privilege Access Management in achieving ro...
Mon, 5th Feb 2024
By Scott McKinnel of Tenable ANZ
Exposure management: a strategic ally in essential eigh...
Mon, 5th Feb 2024
Recent news
About Endpoint Protection
Halcyon introduces Ransomware Warranty Program for enha...
Yesterday
About IT Training
Espionage breaches account for 25% in APAC, report reve...
Yesterday
About Cyber Threats
Industrial sector sees 17% drop in ransomware attacks i...
Yesterday
About Cloud Services
Commvault launches Cloud Cleanroom for cyber attack rec...
2 days ago
About Firewall
Akamai Technologies unveils Guardicore platform for imp...
2 days ago
More news
About Cloud Services
Akamai introduces Guardicore Platform to combat rising ...
3 days ago
About Cloud Services
Illumio included in prestigious Cyber 66 report for the...
4 days ago
About Machine learning
Kaspersky boosts email security features after 77% of f...
4 days ago
About Storage
Object First selects Vitanium for launch of ransomware-...
4 days ago
About Machine learning
ExtraHop report shows Singapore firms vulnerable to ran...
Last week
Even more news
About Cyber Threats
High Performance Podcast duo to keynote Infosecurity Eu...
Last week
About Data encryption
Ransomware threats escalating in Southeast Asia – repor...
Last week
About Cybercrime
Ransomware activity spikes 20%, hospitals now in crossh...
Last week
About Cyber Threats
Mandiant unveils latest M-Trends 2024 cybersecurity rep...
Last week
About Firewall
'Junk gun' ransomware: New low-cost cyber threat target...
Last week
Job moves
Move at NDI
KnowBe4 appoints Cindy Zhou as Chief Marketing Officer
Wed, 8th Nov 2023
Move at Palm
Illumio appoints Todd Palmer as Senior VP of Global Par...
Thu, 2nd Nov 2023
Move at Semperis
Former National Cyber Director Chris Inglis Joins Sempe...
Wed, 20th Sep 2023
Move at NDI
Vitali Edrenkine appointed Chief Marketing Officer at A...
Wed, 19th Jul 2023
Move at SAP
Illumio Names Gautam Mehandru as CMO
Wed, 5th Apr 2023
Other guides
You can read other related guides from Cybersecurity, Malware, Breach Prevention, Firewall, and Network Management.
Powered by