Phishing emails behind notorious ransomware scams revealed

Cybercriminals use phishing emails with malicious links or attachments to distribute ransomware more than any other method. Their goal is […]

Full Details

Ransomware developers learn from the mistakes of WannaCry and NotPetya

The WannaCry ransomware attack earlier this year infected more than 230,000 computers in 150 countries within one day of its release. It […]

Full Details

NIST SP800-171 and the upcoming DFARS deadline for DOD contractors

Defense Federal Acquisition Regulation Supplement (DFARS) clause 225.204-7012 was established in 2015 to protect Controlled Unclassified Information (CUI).  CUI is […]

Full Details

The evolution of a cybercrime: A timeline of ransomware advances

Ransomware, the malicious code that holds data hostage, is now a more common threat to businesses than data breaches. It […]

Full Details

How to determine the true cost of a ransomware attack

The costs associated with a ransomware attack are often viewed from two dimensions: On one side, there is the ransom […]

Full Details

The 6 stages of an Advanced Ransomware Threat attack

Some ransomware are strategically designed to cause as much damage as possible while producing large profits for cybercriminals. And the […]

Full Details
Linux Ransomware

Ransomware threatens Linux servers, especially web servers

Linux is an open-source operating system that is very versatile due to the large group of volunteers that maintain and […]

Full Details