The Ultimate Guide to Ransomware
2024 edition
Overview
Ransomware is malware designed to virtually mimic the age-old crime of capturing items of value and demanding money for their safe return. Ransomware typically arrives via email or a backdoor, locks up valuable computer files, and is followed by a demand for compensation, often in Bitcoin or another cryptocurrency. The hacker promises a decryption tool on payment of the ransom – but there is never any guarantee of delivery or efficacy of the decryption tool.
Analyst reports
IDC MarketScape on ML
Canadian ISA Cybersecurity launches first UK operation ...
3 days ago
IDC on AI
Ransomware peaks as top threat in ANZ as study highligh...
This month
IDC on Storage
Object First's Ootbi marks first anniversary with rapid...
Last month
IDC on NDI
Alarming surge in cyber attacks seen in Acronis report
Last month
Miercom on Malware
Check Point Infinity platform excels in Miercom's secur...
Last month
Expert columns
By Charles Smith of Barracuda Networks
Data tampering is an underrated threat — get your backu...
5 days ago
By Robin Long & Raj Samani of Rapid7
Why the external attack surface matters: An analysis in...
Last week
By James Blake of Cohesity
One billion dollars in funding for even more ransomware
Last month
By Christy Wyatt of Absolute Software
Cybersecurity is your defensive strategy, cyber resilie...
Last month
By Nick Turnbull of BeyondTrust
The role of Privilege Access Management in achieving ro...
Last month
More expert columns
By Scott McKinnel of Tenable ANZ
Exposure management: a strategic ally in essential eigh...
Last month
By Nyuk Loong Kiw of Spark
Combating cybercrime in NZ with a robust cybersecurity ...
Wed, 17th Jan 2024
By Christiaan Beek of Rapid7
The 2023 ransomware stats: A look back to plan ahead
Mon, 15th Jan 2024
By Uri Dorot of Radware
Top seven client-side threats to app security in 2024
Mon, 8th Jan 2024
By Rob Dooley & Sabeen Malik of Rapid7
Why 2024 is set to be a pivotal year in cybersecurity
Mon, 11th Dec 2023
By Scott Hesford of BeyondTrust
Aussie firms must contextualize rising cyber incident d...
Wed, 6th Dec 2023
Top players
You can read more from the top players Sophos, Lockbit, Fortinet, Trend Micro, and Check Point Software.
Recent news
About Security breaches
BackBox introduces major update to Network Vulnerabilit...
Yesterday
About Threat intelligence
Ransomware attacks rise by 46% in February 2024, finds ...
Yesterday
About Malware
Global malware surge revealed in WatchGuard's latest In...
2 days ago
About Penetration testing
ICS partners with e2e-assure to enhance cyber security ...
3 days ago
About Software-as-a-Service
Claroty & Axonius unite for stronger enterprise cyber r...
3 days ago
More news
About IT Industry
Object First partners with Pedab for superior Veeam dat...
4 days ago
About Data Protection
Rising ransomware attacks amplify World Backup Day's im...
5 days ago
About Business Continuity
Keepit's cloud backup solution offers rapid ransomware ...
Last week
About Malware
Ransomware attacks against companies rise by 27% in 202...
Last week
About Scams
Cybercrime reports drop in NZ, but threats persist
Last week
Even more news
About Malware
Australia ranks high in global malware detection rates,...
This month
About Small Business
Sophos 2024 report reveals top cybersecurity threats to...
This month
About Internet of Things
Claroty launches healthcare cyber threat detection modu...
This month
About Piracy
Are C-suite executives cybersecurity's weakest link?
This month
About Threat intelligence
Flare's new tool offers innovative ransomware supply ch...
This month
Job moves
Move at Women in Technology
KnowBe4 appoints Cindy Zhou as Chief Marketing Officer
Wed, 8th Nov 2023
Move at Palm
Illumio appoints Todd Palmer as Senior VP of Global Par...
Thu, 2nd Nov 2023
Move at Government
Former National Cyber Director Chris Inglis Joins Sempe...
Wed, 20th Sep 2023
Move at Data Protection
Vitali Edrenkine appointed Chief Marketing Officer at A...
Wed, 19th Jul 2023
Move at Tanium
Illumio Names Gautam Mehandru as CMO
Wed, 5th Apr 2023
Other guides
You can read other related guides from Cybersecurity, Malware, Breach Prevention, Firewall, and Network Management.
Powered by