The Ultimate Guide to Ransomware
2025 edition
Overview
Ransomware is malware designed to virtually mimic the age-old crime of capturing items of value and demanding money for their safe return. Ransomware typically arrives via email or a backdoor, locks up valuable computer files, and is followed by a demand for compensation, often in Bitcoin or another cryptocurrency. The hacker promises a decryption tool on payment of the ransom – but there is never any guarantee of delivery or efficacy of the decryption tool.
Analyst reports

Gartner on Cybersecurity
Safebreach launches platform for enterprise cyber risk ...
Last month

Gartner on DevOps
SafeBreach launches new exposure validation platform
Last month

Gartner on Advanced Persistent Threat Protection
Semperis achieves ARR milestone with USD $100 million m...
Fri, 31st Jan 2025

IDC MarketScape on Malware
Sophos MDR services protect 26,000 organisations global...
Tue, 14th Jan 2025

Canalys on Digital Transformation
Veritas wins Storage Partner of the Year at AWS awards
Thu, 5th Dec 2024
Expert columns

By Peter Philipp of Neo4j
How graph databases are improving the resilience of sup...
Today

By Dakshitaa Babu of SquareX
Why ClickFix attacks are outpacing enterprise security
Last week

By Gareth Russell of Commvault
Observations on the state of cyber readiness
This month

By Anthony Spiteri of Veeam
Government Strategies Against Cybercrime: A Deep Dive
This month

By Simon Pamplin of Certes
Beyond ransomware payments: A proactive approach to cyb...
Last month
Interviews

Discussing Cryptocurrency
Exclusive: Cyber threats escalate as Australian organis...
This month

Discussing Firewalls
Exclusive: SonicWall’s Yuvraj Pradhan discusses 2025 se...
Thu, 23rd Jan 2025

Discussing Firewalls
Exclusive: SonicWall VP outlines cybersecurity evolutio...
Fri, 17th Jan 2025

Discussing Bank security
Exclusive: How Semperis is tackling identity-based cybe...
Mon, 16th Dec 2024

Discussing Data breach
Exclusive: How KnowBe4 stopped a North Korean hacker fr...
Fri, 29th Nov 2024
More expert columns

By Jason Whyte of Trustwave
How to outsmart ransomware and build resilience within ...
Last month

By Steve Stone of SentinelOne
Cybersecurity in 2025: A Landscape of Evolving Threats ...
Thu, 30th Jan 2025

By Martin Zugec of Bitdefender
Cybersecurity predictions 2025: Hype vs. reality
Fri, 17th Jan 2025

By Mark Baker of Check Point Software Technologies
The role of the board in shaping resilient cybersecurit...
Wed, 15th Jan 2025

By Stephen Kho of Avast
Ransomware is doubling down — What you need to know abo...
Tue, 7th Jan 2025

By Jake King of Elastic Security
Elastic Security's top three cybersecurity predictions ...
Tue, 17th Dec 2024
Recent news

About Malware
Cybercriminals advance with MEDUSA ransomware campaign
Today

About Data Protection
Essential Tech achieves ISO27001:2022 certification suc...
Today

About Malware
Tenable warns DeepSeek AI model can be breached for mal...
Last week

About Cyber Threats
CyXcel achieves approved vendor status by UK cyber cent...
Last week

About Software-as-a-Service
Global education sector unprepared for rising cyberatta...
Last week
More news

About Cloud Services
World Backup Day highlights need for Active Directory f...
Last week

About Malware
APAC CIOs prioritise tech investment for growth in 2025
Last week

About Threat intelligence
February 2025 reports record spike in ransomware attack...
This month

About Cloud Services
VMware vulnerabilities highlight need for data protecti...
This month

About Data Protection
Australia introduces new cybersecurity compliance laws ...
This month
Even more news

About Firewalls
Cyber threats from VPNs lead ransomware incidents in 20...
This month

About Data Protection
Nasuni & CrowdStrike partner for enhanced threat detect...
This month

About Malware
Microsoft & Fortra's joint fight against Cobalt Strike ...
This month

About Malware
Rise in cyberattacks using legitimate RMM tools noted
This month

About Phishing
KnowBe4's global report finds rising cyber threats aime...
This month
Job moves

Move at Cohesity
Cohesity strengthens security with new advisory additio...
Fri, 17th Jan 2025

Move at Fujitsu
OpSys appoints Shanna Daly as first Chief Security Offi...
Mon, 28th Oct 2024

Move at Sophos
Sophos appoints new Chief Revenue Officer & VP of Sales
Thu, 24th Oct 2024

Move at Sophos
Sophos appoints Teresa Anania as new Chief Customer Off...
Tue, 23rd Jul 2024

Move at NetApp
Mark Fioretto named NetApp's new VP for Australia & New...
Tue, 16th Jul 2024
Other guides
You can read other related guides from Cybersecurity, Malware, Breach Prevention, Advanced Persistent Threat Protection, and Artificial Intelligence.
Powered by