Blog

10 August, 2022

The ‘First Rule’ of Ransomware Negotiations

In some countries, kidnappings are so common that an entire industry of negotiators and consultants emerged to facilitate the exchange of ransoms and the safe recovery of victims. Many aspect
Katherine Gorham
08 August, 2022

Cryptojacking and Ransomware

One form of ransomware quickly making a name for itself is cryptojacking. With this type of attack, bad actors work to take over any system with processing power for the purpose of harnessing
Cary Kostka
05 August, 2022

Geopolitics Sparking a Rise in Linux-Based Attacks

The stereotypical profile of a hacker in his parents’ basement developing and launching attacks can officially be put to rest. The geopolitical nature of executing attacks against states or
Cary Kostka
04 August, 2022

Does Having Cyberinsurance Make You a Target for Ransomware Attacks?

Buying cyberinsurance in case of a ransomware attack is a common action for organizations. But will the very fact you’ve taken that step make you more vulnerable to attack? That may have be
Keith Ward
03 August, 2022

How Many Ransomware Victims Are Really Out There?

How many organizations across the world were successfully breached by ransomware in the last 12 months? Normally, blogs such as this rely on guesstimates to answer such questions, but now the
John E. Dunn
02 August, 2022

Are Honeypots and Deception Technology the Same Thing?

In the past decade we have seen cybersecurity companies releasing new products under the category of “deception technology.” For industry veterans, these solutions sound a lot like honeyp
Brad Rudisail
29 July, 2022

Are Ransomware Attacks Really Declining?

Something unexpected is happening to ransomware statistics: for the first time since anyone can remember, the volume of attacks seems to be dropping quarter-over-quarter.  The evidence f
John E. Dunn
28 July, 2022

The Need for Multifactor Authentication for Higher Ed

Colleges and universities service a diverse group of information technology customers. Those customers generally fall into three distinct groups composed of faculty, staff, and students. Beca
Steve Linthicum
27 July, 2022

Ransomware: What Are Linux Users Up Against?

Attackers have increased their attacks against Linux-based devices over the past year, taking advantage of several key factors. From general complacency to the hyperconnectivity of the public
Cary Kostka
1 13 14 15 16 17 32

Is This Your Business?
Get In Touch

Contact Us To Sponsor Your Business Listing & Learn More About The Benfits.

Before You Go!
Sign up to stay up to date with everything ransomware

Sign Up To Receive Our Monthly Ransomware Newsletter
Don’t worry, we hate spam too

JUST RELEASED: The 2024 State of Ransomware Survey is in.

A REVEALING REPORT FOR IT PROFESSIONALS BY IT PROFESSIONALS

Share via
Copy link
Powered by Social Snap