Ransomware attackers know that industries with the most to lose are often the best targets, since the greater the potential disruption of that industry, the greater their chances of getting p
The most notable ransomware-as-a-service (RaaS) groups are well-known for the widely publicized attacks they conduct, even outside of the cybersecurity community. However, there also exist sm
Sponsored Post: Nick Hayes, CrowdStrike Senior Product Marketing Manager. We’ve all seen the devastating impact adversaries and ransomware attacks can have on organizations—taking down cr
When tallying damages associated with a ransomware attack, the initial focus centers on calculating costs relating to the six steps detailed in the NIST Computer Security Incident Handling Gu
In some countries, kidnappings are so common that an entire industry of negotiators and consultants emerged to facilitate the exchange of ransoms and the safe recovery of victims. Many aspect
One form of ransomware quickly making a name for itself is cryptojacking. With this type of attack, bad actors work to take over any system with processing power for the purpose of harnessing
The stereotypical profile of a hacker in his parents’ basement developing and launching attacks can officially be put to rest. The geopolitical nature of executing attacks against states or
Buying cyberinsurance in case of a ransomware attack is a common action for organizations. But will the very fact you’ve taken that step make you more vulnerable to attack? That may have be
How many organizations across the world were successfully breached by ransomware in the last 12 months? Normally, blogs such as this rely on guesstimates to answer such questions, but now the