The Ultimate Guide to Ransomware
2024 edition
Overview
Ransomware is malware designed to virtually mimic the age-old crime of capturing items of value and demanding money for their safe return. Ransomware typically arrives via email or a backdoor, locks up valuable computer files, and is followed by a demand for compensation, often in Bitcoin or another cryptocurrency. The hacker promises a decryption tool on payment of the ransom – but there is never any guarantee of delivery or efficacy of the decryption tool.
Analyst reports
Canalys on Digital Transformation
Veritas wins Storage Partner of the Year at AWS awards
This month
Gartner on Malware
Check Point Software named Visionary in 2024 Gartner re...
Fri, 27th Sep 2024
Gartner on ERP
Ransomware attacks increasingly target ERP systems
Thu, 29th Aug 2024
Forrester Wave on Malware
ColorTokens named leader in Forrester Wave for microseg...
Thu, 29th Aug 2024
IDC on Advanced Persistent Threat Protection
Ransomware attacks soar 63% in US, 67% in UK, says repo...
Thu, 22nd Aug 2024
Featured news
About Bank security
Exclusive: How Semperis is tackling identity-based cybe...
Last week
About Data breach
Exclusive: How KnowBe4 stopped a North Korean hacker fr...
Last month
About EduTech
Exclusive: Australians express rising concern over AI i...
Wed, 16th Oct 2024
About Threat intelligence
Exclusive: Mandiant Consulting highlights evolving cybe...
Fri, 11th Oct 2024
About Storage
Exclusive: Wasabi's Rob Waite discusses growth, cloud s...
Tue, 1st Oct 2024
Expert columns
By Jake King of Elastic Security
Elastic Security's top three cybersecurity predictions ...
Last week
By Julian Fay of Senetas
Australia’s Cybersecurity Act races against augmented h...
This month
By Lesley Carhart of Dragos
The imperative of cybersecurity in manufacturing
This month
By Jon Fielding of Apricorn
Why companies must rethink their recovery plans
This month
By Adam Barnett of Rapid7
December Patch Tuesday reveals 70 vulnerabilities
This month
Interviews
Discussing Bank security
Exclusive: How Semperis is tackling identity-based cybe...
Last week
Discussing Data breach
Exclusive: How KnowBe4 stopped a North Korean hacker fr...
Last month
Discussing EduTech
Exclusive: Australians express rising concern over AI i...
Wed, 16th Oct 2024
Discussing Threat intelligence
Exclusive: Mandiant Consulting highlights evolving cybe...
Fri, 11th Oct 2024
Discussing Storage
Exclusive: Wasabi's Rob Waite discusses growth, cloud s...
Tue, 1st Oct 2024
More expert columns
By Sadiq Iqbal of Check Point Software Technologies
From deepfakes to ransomware: The key trends which will...
This month
By Derek Manky of Fortinet
Threat predictions for 2025: Get ready for bigger, bold...
Last month
By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Last month
By Aaron Sharp of Verizon
How data breaches erode trust and what companies can do
Last month
By Ashley Diffey of Ping Identity
Three phases in the evolving Australian business conver...
Fri, 11th Oct 2024
By Mark Bowling of ExtraHop
Visibility is vital for detecting ransomware attacks
Tue, 8th Oct 2024
Recent news
About Data Protection
Trend Micro warns of AI-driven cyber threats by 2025
Last week
About Firewalls
Cybercriminals increasingly exploit trusted apps, says ...
Last week
About EduTech
CSIS report reveals surge in sophisticated cyber threat...
Last week
About Malware
Ransomware report reveals evolving threat landscape in ...
Last week
About Multi-factor authentication
Manufacturing sector hit hardest by ransomware in 2024
Last week
More news
About Renewable energy
Spearphishing identified as leading threat to utilities
Last week
About Malware
2024 cyber threat landscape highlights key attack trend...
Last week
About Smartphones
Arctic Wolf to acquire Cylance from BlackBerry for USD ...
Last week
About Patching
Cybersecurity trends 2025: AI, supply chains, resilienc...
Last week
About AI Security
Business leaders tackle tech obsolescence & regulation ...
This month
Even more news
About Data Protection
Cybersecurity risks rise during mergers & acquisitions
This month
About Cloud Security
Check Point solution achieves 100% detection in MITRE t...
This month
About Security Operations Centre
SentinelOne excels in 2024 MITRE ATT&CK evaluations
This month
About Online security
KnowBe4 report finds rise in HR & IT email phishing
This month
About Data breach
UK urged to prioritise reform against cyber attack risk...
This month
Job moves
Move at Fujitsu
OpSys appoints Shanna Daly as first Chief Security Offi...
Mon, 28th Oct 2024
Move at Sophos
Sophos appoints new Chief Revenue Officer & VP of Sales
Thu, 24th Oct 2024
Move at Sophos
Sophos appoints Teresa Anania as new Chief Customer Off...
Tue, 23rd Jul 2024
Move at NetApp
Mark Fioretto named NetApp's new VP for Australia & New...
Tue, 16th Jul 2024
Move at Commvault
Commvault appoints Russell as CTO for APAC to boost cyb...
Mon, 27th May 2024
Other guides
You can read other related guides from Cybersecurity, Malware, Breach Prevention, Advanced Persistent Threat Protection, and Artificial Intelligence.
Powered by