5 Secrets to Survive the Encryption Apocalypse

The zombie apocalypse is frequently mentioned in literature and pop culture.  Some have even taken steps to protect against this […]

Full Details

Backups Saved 16,000 Patient Records from Ransomware

Cyber attacks on hospitals and other healthcare institutions have increased over the last 18 months, in part because they make […]

Full Details

3 Ways Ransomware Will Evolve in 2018

There’s no doubt that cybercriminals are busy preparing more ransomware attacks for the remainder of 2018. And that ransomware code […]

Full Details

Effective Ransomware Prevention and Response

Our companies and data are under an increasing assault from ransomware.  Its scale and scope have only grown as profits […]

Full Details

Essential Ransomware Prevention Techniques

2017 was called the year of ransomware, but ransomware is showing no signs of slowing down.  Ransomware is expected to […]

Full Details

Phishing emails behind notorious ransomware scams revealed

Cybercriminals use phishing emails with malicious links or attachments to distribute ransomware more than any other method. Their goal is […]

Full Details

Ransomware developers learn from the mistakes of WannaCry and NotPetya

The WannaCry ransomware attack earlier this year infected more than 230,000 computers in 150 countries within one day of its release. It received […]

Full Details

The evolution of a cybercrime: A timeline of ransomware advances

Ransomware, the malicious code that holds data hostage, is now a more common threat to businesses than data breaches. It […]

Full Details

How to determine the true cost of a ransomware attack

The costs associated with a ransomware attack are often viewed from two dimensions: On one side, there is the ransom […]

Full Details

The 6 stages of an Advanced Ransomware Threat attack

Some ransomware are strategically designed to cause as much damage as possible while producing large profits for cybercriminals. And the […]

Full Details
Linux Ransomware

Ransomware threatens Linux servers, especially web servers

Linux is an open-source operating system that is very versatile due to the large group of volunteers that maintain and […]

Full Details

Tabletop simulation exercises speed up ransomware response

Most people will never have a fire in their home or office, but everyone can remember going through a fire […]

Full Details

Karmen ransomware makes it easy to launch attacks

A new ransomware do-it-yourself kit called Karmen is making it easy for wannabe cybercriminals to launch ransomware attacks. Security researchers […]

Full Details

Mac Users Face Increased Ransomware Threats

Apple Inc. has a reputation for building secure devices, but don’t become too complacent because ransomware threats to Mac users […]

Full Details

Ransomware extortionists not as trustworthy as they’d have you believe

There are a variety of different ransomware variants that encrypt your data with no intention of ever decrypting it. There […]

Full Details

Ransomware Recovery: How to meet realistic Recovery Time Objectives (RTOs)

When it comes to ransomware attacks, those who lose valuable data and have no viable backup tend to pay the […]

Full Details

Spora ransomware could become a major player

Spora is a relatively new ransomware, but there are signs which indicate that it could become a major player in […]

Full Details

The top 10 ransomware attack vectors

Ransomware is infecting the computers of unsuspecting victims at an astronomical rate. The various methods that cybercriminals use to take […]

Full Details

How ransomware extortionists hide their tracks

Cybercriminals extorted about one billion dollars from ransomware victims last year, according to the FBI. And nearly all of those […]

Full Details

Resume Ransomware: GoldenEye targets hiring managers, recruiters and HR

People charged with filling career positions at their companies need to be on the lookout for ransomware, especially GoldenEye ransomware. […]

Full Details

PopcornTime offers victims a choice: Pay the ransom or infect your friends

PopcornTime is a newly-discovered form or ransomware that is still in the development stages but operates off a disturbing principle: […]

Full Details

Ransomware distributor gets hacked: A look behind the curtain

Two email accounts of a ransomware distributor were recently compromised. The analysis of these accounts gives an interesting “behind the […]

Full Details

The psychology of a ransomware attack: A guide to what makes victims click

Cybercrime is very much a psychological game and ransomware is no exception. Psychology plays a major role in almost all […]

Full Details

Enterprise Ransomware Protection Insights

This past year, ransomware has extorted vast sums of money from enterprises.  Ransomware is a form of malware that encrypts […]

Full Details

Protecting against APTs with Machine learning

Machine learning is a science that uses existing data on a subject to train a computer how to identify related […]

Full Details

Backup and recovery means you can say no to ransom demands

Ransomware continues to be a huge problem for companies and consumers—and a major source of income for cybercriminals. Malicious hackers […]

Full Details

New version of Cerber ransomware hits businesses where it hurts

The latest version of Cerber ransomware is targeting database applications and putting business’s most valuable data at risk, according to […]

Full Details

Breaking Free: A list of ransomware decryption tools and keys

Security software companies and research organizations are collaborating to break the encryption codes of ransomware variants and free those who […]

Full Details

Warning: Some ransomware attacks are just a diversion

Ransomware computer viruses are becoming more sophisticated—and so are the attacks that make use of ransomware. In some cases, ransomware […]

Full Details

Ransomware Incident Response: 7 steps to success

Ransomware infections are becoming increasingly commonplace, and companies that put a plan together before an incident are much more effective […]

Full Details

Mamba ransomware takes a bigger bite out of your data

As if encrypting your individual files was not enough, a recently discovered ransomware called Mamba encrypts your entire hard drive. […]

Full Details

The Economics of Extortion: Understanding the ransomware market

We all know money is the motivating force behind cybercrimes like the creation and distribution of ransomware. The interesting twist […]

Full Details

Pokemon Go ransomware virus is out to catch’em all

A Pokemon Go themed ransomware virus has appeared on Windows computers, tablets, and phones. The ransomware is the latest in […]

Full Details

Cybercriminals turn to DIY kits and Ransomware as a Service (RaaS)

Ransomware creators are monetizing their software in creative new ways. Not only are they using ransomware to encrypt files and […]

Full Details

Will Hacktivists Turn to Ransomware?

The US presidential election is upon us and some political activists are out in the streets, and in convention halls. […]

Full Details

Newest Ransomware has Polished, Professional Look

Criminals are raising the bar in the fight for your money.  It’s natural to expect that competition would follow success—and […]

Full Details

Geolocation technology helps ransomware deliver targeted message

It might surprise you to know that ransomware uses geolocation technology to customize payloads and target individuals. You probably already […]

Full Details

Adding Ransomware to Security Radars

Ransomware is the quickest way to turn your valuable data into garbage.  Ransomware is a form of malicious software that […]

Full Details

Ransomware 101

Ransomware is an evolving malware threat.  Where once malware was predominantly an inconvenience, ransomware takes aim at data, the lifeblood of […]

Full Details