Category: Ransomware Articles

We’ve all heard the adage “You can catch more flies with honey than vinegar.” The phrase dates back to 1666, where it appeared as an Italian proverb. However, the principle remains true today and even relates to cybersecurity. I’m talking about the ‘Honeypot,’ which is a tool utilized to lure hackers and cybercriminals to catch […]

I’m a private pilot (although dormant), and used to own my own little plane. It was a fun hobby, until I moved, my mortgage doubled, and I decided I couldn’t afford to own a plane anymore. I still love aviation, and in fact am in the process of building a decent setup to use Microsoft […]

For most of us, the chance of being caught up in a data breach is just another hazard of online life. Personally identifiable information (PII) is stolen from a company we have an association with, and nobody is the wiser unless the company contacts us with the bad news. Except not every company wants to […]

Once upon a time, Linux was thought of as being the most secure from ransomware of all operating systems. This reputation stemmed from its relatively low adoption rate when compared to Microsoft Windows, and the lack of Linux-based programming skills within the general IT community. However, ransomware developers have an uncanny knack for quickly bounding […]

I recently outlined the many methods of ransomware infection to showcase the ways ransomware can gain a foothold. Cheerscrypt adds yet another: VMware ESXi servers, which many organizations rely on to host virtual machines (VMs) for many different functions. Much like RDP Ransomware, VM ransomware targets the host so that the damage spreads exponentially to […]

The U.S. has a way to cut off funding to some ransomware gangs, and it works—but it’s seldom used. If the U.S. has economic sanctions against a nation (Iran, Russia, and North Korea, for example) then it can be illegal for American companies to deal with organizations from that nation. This can include paying ransom […]