The Ultimate Guide to Ransomware
2024 edition
Overview
Ransomware is malware designed to virtually mimic the age-old crime of capturing items of value and demanding money for their safe return. Ransomware typically arrives via email or a backdoor, locks up valuable computer files, and is followed by a demand for compensation, often in Bitcoin or another cryptocurrency. The hacker promises a decryption tool on payment of the ransom – but there is never any guarantee of delivery or efficacy of the decryption tool.
Analyst reports
IDC MarketScape on ML
Canadian ISA Cybersecurity launches first UK operation ...
Last month
IDC on Firewall
Ransomware peaks as top threat in ANZ as study highligh...
Last month
IDC on Storage
Object First's Ootbi marks first anniversary with rapid...
Mon, 19th Feb 2024
IDC on CIOs
Alarming surge in cyber attacks seen in Acronis report
Thu, 8th Feb 2024
Miercom on Malware
Check Point Infinity platform excels in Miercom's secur...
Wed, 7th Feb 2024
Expert columns
By Andrew Rose of SoSafe
Building the cyber defences needed to ward off attacks
Today
By Conan Bradley of Kordia
Rebuilding after ransomware – The case of The British L...
This month
By Gabriel Moss of Barracuda Networks Inc
How attackers weaponise generative AI through data pois...
This month
By Matt Caffrey of Barracuda Australia
How to defend your business against AI-powered ransomwa...
This month
By Charles Smith of Barracuda Networks
Data tampering is an underrated threat — get your backu...
Last month
More expert columns
By Robin Long & Raj Samani of Rapid7
Why the external attack surface matters: An analysis in...
Last month
By James Blake of Cohesity
One billion dollars in funding for even more ransomware
Fri, 23rd Feb 2024
By Christy Wyatt of Absolute Software
Cybersecurity is your defensive strategy, cyber resilie...
Fri, 16th Feb 2024
By Nick Turnbull of BeyondTrust
The role of Privilege Access Management in achieving ro...
Mon, 5th Feb 2024
By Scott McKinnel of Tenable ANZ
Exposure management: a strategic ally in essential eigh...
Mon, 5th Feb 2024
By Nyuk Loong Kiw of Spark
Combating cybercrime in NZ with a robust cybersecurity ...
Wed, 17th Jan 2024
Top players
Recent news
About Encryption
Kaspersky illuminates LockBit ransomware group's advanc...
Today
About Encryption
Cado Security unmasks Cerber ransomware threat to Confl...
Yesterday
About Data Protection
IBM strengthens cyber resilience alliance with Cohesity
3 days ago
About Data Protection
Panzura launches rapid ransomware recovery solution
Last week
About Incident Response
Cloudflare & Booz Allen unite to bolster cyber attack r...
Last week
More news
About Digital Transformation
Wavelink gets sole Claroty distributorship for Australi...
Last week
About Firewall
Sophos & Tenable join forces to launch Sophos Managed R...
This month
About Phishing
Australia unprepared for cybersecurity threats, says Ci...
This month
About Firewall
Ransomware retains top spot, Sophos cybercrime report r...
This month
About Malware
Zyxel Networks highlights AI's key role in SMB network ...
Last month
Even more news
About Security breaches
BackBox introduces major update to Network Vulnerabilit...
Last month
About Threat intelligence
Ransomware attacks rise by 46% in February 2024, finds ...
Last month
About Malware
Global malware surge revealed in WatchGuard's latest In...
Last month
About Testing
ICS partners with e2e-assure to enhance cyber security ...
Last month
About Software-as-a-Service
Claroty & Axonius unite for stronger enterprise cyber r...
Last month
Job moves
Move at NDI
KnowBe4 appoints Cindy Zhou as Chief Marketing Officer
Wed, 8th Nov 2023
Move at Palm
Illumio appoints Todd Palmer as Senior VP of Global Par...
Thu, 2nd Nov 2023
Move at Semperis
Former National Cyber Director Chris Inglis Joins Sempe...
Wed, 20th Sep 2023
Move at NDI
Vitali Edrenkine appointed Chief Marketing Officer at A...
Wed, 19th Jul 2023
Move at SAP
Illumio Names Gautam Mehandru as CMO
Wed, 5th Apr 2023
Other guides
You can read other related guides from Cybersecurity, Malware, Breach Prevention, Firewall, and Network Management.
Powered by