The Ultimate Guide to Ransomware
2024 edition
Overview
Ransomware is malware designed to virtually mimic the age-old crime of capturing items of value and demanding money for their safe return. Ransomware typically arrives via email or a backdoor, locks up valuable computer files, and is followed by a demand for compensation, often in Bitcoin or another cryptocurrency. The hacker promises a decryption tool on payment of the ransom – but there is never any guarantee of delivery or efficacy of the decryption tool.
Analyst reports
IDC MarketScape on ML
Canadian ISA Cybersecurity launches first UK operation ...
Last month
IDC on Firewall
Ransomware peaks as top threat in ANZ as study highligh...
Last month
IDC on Storage
Object First's Ootbi marks first anniversary with rapid...
Mon, 19th Feb 2024
IDC on CIOs
Alarming surge in cyber attacks seen in Acronis report
Thu, 8th Feb 2024
Miercom on Malware
Check Point Infinity platform excels in Miercom's secur...
Wed, 7th Feb 2024
Expert columns
By Andrew Rose of SoSafe
Building the cyber defences needed to ward off attacks
Last week
By Conan Bradley of Kordia
Rebuilding after ransomware – The case of The British L...
This month
By Gabriel Moss of Barracuda Networks Inc
How attackers weaponise generative AI through data pois...
This month
By Matt Caffrey of Barracuda Australia
How to defend your business against AI-powered ransomwa...
This month
By Charles Smith of Barracuda Networks
Data tampering is an underrated threat — get your backu...
Last month
More expert columns
By Robin Long & Raj Samani of Rapid7
Why the external attack surface matters: An analysis in...
Last month
By James Blake of Cohesity
One billion dollars in funding for even more ransomware
Fri, 23rd Feb 2024
By Christy Wyatt of Absolute Software
Cybersecurity is your defensive strategy, cyber resilie...
Fri, 16th Feb 2024
By Nick Turnbull of BeyondTrust
The role of Privilege Access Management in achieving ro...
Mon, 5th Feb 2024
By Scott McKinnel of Tenable ANZ
Exposure management: a strategic ally in essential eigh...
Mon, 5th Feb 2024
By Nyuk Loong Kiw of Spark
Combating cybercrime in NZ with a robust cybersecurity ...
Wed, 17th Jan 2024
Top players
Recent news
About Cyber Threats
High Performance Podcast duo to keynote Infosecurity Eu...
Yesterday
About Data encryption
Ransomware threats escalating in Southeast Asia – repor...
Yesterday
About Cybercrime
Ransomware activity spikes 20%, hospitals now in crossh...
Yesterday
About Cyber Threats
Mandiant unveils latest M-Trends 2024 cybersecurity rep...
2 days ago
About Firewall
'Junk gun' ransomware: New low-cost cyber threat target...
3 days ago
More news
About Threat intelligence
Healthcare sector's cybersecurity confidence misplaced,...
3 days ago
About Malware
Tecala partners with Check Point to boost Australia's e...
4 days ago
About Encryption
Kaspersky illuminates LockBit ransomware group's advanc...
Last week
About Encryption
Cado Security unmasks Cerber ransomware threat to Confl...
Last week
About Data Protection
IBM strengthens cyber resilience alliance with Cohesity
Last week
Even more news
About Data Protection
Panzura launches rapid ransomware recovery solution
This month
About Incident Response
Cloudflare & Booz Allen unite to bolster cyber attack r...
This month
About Digital Transformation
Wavelink gets sole Claroty distributorship for Australi...
This month
About Firewall
Sophos & Tenable join forces to launch Sophos Managed R...
This month
About Phishing
Australia unprepared for cybersecurity threats, says Ci...
This month
Job moves
Move at NDI
KnowBe4 appoints Cindy Zhou as Chief Marketing Officer
Wed, 8th Nov 2023
Move at Palm
Illumio appoints Todd Palmer as Senior VP of Global Par...
Thu, 2nd Nov 2023
Move at Semperis
Former National Cyber Director Chris Inglis Joins Sempe...
Wed, 20th Sep 2023
Move at NDI
Vitali Edrenkine appointed Chief Marketing Officer at A...
Wed, 19th Jul 2023
Move at SAP
Illumio Names Gautam Mehandru as CMO
Wed, 5th Apr 2023
Other guides
You can read other related guides from Cybersecurity, Malware, Breach Prevention, Firewall, and Network Management.
Powered by