The Ultimate Guide to Ransomware
2024 edition
Overview
Ransomware is malware designed to virtually mimic the age-old crime of capturing items of value and demanding money for their safe return. Ransomware typically arrives via email or a backdoor, locks up valuable computer files, and is followed by a demand for compensation, often in Bitcoin or another cryptocurrency. The hacker promises a decryption tool on payment of the ransom – but there is never any guarantee of delivery or efficacy of the decryption tool.
Analyst reports
IDC on AI
Ransomware peaks as top threat in ANZ as study highligh...
Last week
IDC on Storage
Object First's Ootbi marks first anniversary with rapid...
Last month
IDC on Island hopping
Alarming surge in cyber attacks seen in Acronis report
Last month
Miercom on Malware
Check Point Infinity platform excels in Miercom's secur...
Last month
IDC on Malware
Check Point launches Quantum Spark to boost cybersecuri...
Last month
Expert columns
By James Blake of Cohesity
One billion dollars in funding for even more ransomware
Last month
By Christy Wyatt of Absolute Software
Cybersecurity is your defensive strategy, cyber resilie...
Last month
By Nick Turnbull of BeyondTrust
The role of Privilege Access Management in achieving ro...
Last month
By Scott McKinnel of Tenable ANZ
Exposure management: a strategic ally in essential eigh...
Last month
By Nyuk Loong Kiw of Spark
Combating cybercrime in NZ with a robust cybersecurity ...
Wed, 17th Jan 2024
More expert columns
By Christiaan Beek of Rapid7
The 2023 ransomware stats: A look back to plan ahead
Mon, 15th Jan 2024
By Uri Dorot of Radware
Top seven client-side threats to app security in 2024
Mon, 8th Jan 2024
By Rob Dooley & Sabeen Malik of Rapid7
Why 2024 is set to be a pivotal year in cybersecurity
Mon, 11th Dec 2023
By Scott Hesford of BeyondTrust
Aussie firms must contextualize rising cyber incident d...
Wed, 6th Dec 2023
By Mark Gorrie of Gen
Why Whac-A-Mole is not a strategy for defending against...
Thu, 23rd Nov 2023
By Apu Pavithran of Hexnode
Safeguarding critical Infrastructures from cyber threat...
Mon, 31st Jul 2023
Top players
You can read more from the top players Sophos, Lockbit, Fortinet, Trend Micro, and Check Point Software.
Recent news
About Malware
Australia ranks high in global malware detection rates,...
Last week
About Small Business
Sophos 2024 report reveals top cybersecurity threats to...
Last week
About Internet of Things
Claroty launches healthcare cyber threat detection modu...
Last week
About Piracy
Are C-suite executives cybersecurity's weakest link?
This month
About Threat intelligence
Flare's new tool offers innovative ransomware supply ch...
This month
More news
About Compliance
Integrity360 announces Security First 2024 featuring Lo...
This month
About Renewable energy
Keepit opens London HQ to bolster SaaS data protection ...
Last month
About Threat intelligence
Parliament cyber summit highlights AI threat to nationa...
Last month
About Multi-factor authentication
Human error is the top cyber threat, according to CTOs
Last month
About Digital risk
Coalition predicts 25% surge in cyber vulnerabilities f...
Last month
Even more news
About Government
Half-year surge in cyber attacks on infrastructure, say...
Last month
About Endpoint Detection and Response
Trend Micro uncovers Water Hydra's Windows Defender exp...
Last month
About Elections
Tidal Cyber maps out 2024's election cyber threats worl...
Last month
About Cloud Services
Visa's AI technology thwarts $714m fraud in Australia
Last month
About Cloud Services
Google Cloud's 2024 report highlights key cyber threats...
Last month
Job moves
Move at Women in Technology
KnowBe4 appoints Cindy Zhou as Chief Marketing Officer
Wed, 8th Nov 2023
Move at Palm
Illumio appoints Todd Palmer as Senior VP of Global Par...
Thu, 2nd Nov 2023
Move at Government
Former National Cyber Director Chris Inglis Joins Sempe...
Wed, 20th Sep 2023
Move at Data Protection
Vitali Edrenkine appointed Chief Marketing Officer at A...
Wed, 19th Jul 2023
Move at Tanium
Illumio Names Gautam Mehandru as CMO
Wed, 5th Apr 2023
Other guides
You can read other related guides from Cybersecurity, Malware, Breach Prevention, Firewall, and Network Management.
Powered by