Phishing emails behind notorious ransomware scams revealed

Cybercriminals use phishing emails with malicious links or attachments to distribute ransomware more than any other method. Their goal is […]

Full Details

Ransomware developers learn from the mistakes of WannaCry and NotPetya

The WannaCry ransomware attack earlier this year infected more than 230,000 computers in 150 countries within one day of its release. It […]

Full Details

The evolution of a cybercrime: A timeline of ransomware advances

Ransomware, the malicious code that holds data hostage, is now a more common threat to businesses than data breaches. It […]

Full Details

How to determine the true cost of a ransomware attack

The costs associated with a ransomware attack are often viewed from two dimensions: On one side, there is the ransom […]

Full Details

The 6 stages of an Advanced Ransomware Threat attack

Some ransomware are strategically designed to cause as much damage as possible while producing large profits for cybercriminals. And the […]

Full Details
Linux Ransomware

Ransomware threatens Linux servers, especially web servers

Linux is an open-source operating system that is very versatile due to the large group of volunteers that maintain and […]

Full Details

Tabletop simulation exercises speed up ransomware response

Most people will never have a fire in their home or office, but everyone can remember going through a fire […]

Full Details