The Ransomware.org
Blog

Keep up to date on all things "Ransomware" and 
stay one step ahead of ransomware actors.
July 13, 2022
‘Internet of Things’ Devices and Ransomware

When discussing the ever-changing ransomware threat landscape, we often talk about what devices threat actors will target next. In addition to mobile devices, the other technology I get asked about the most is “Internet of Things” (IoT), and whether we should expect threat actors to begin going after the “smart” products in our homes or […]

Read More
July 12, 2022
6 Steps To Secure Microsoft Exchange Against Ransomware

Because Microsoft Exchange is so often targeted by ransomware gangs and other malicious organizations, it’s critical to do everything possible to secure your Exchange environment. And for organizations that still host some or all their Exchange servers on-premises, it’s doubly important.Recommendations regarding the security of your Exchange systems aren’t much different than the advice your […]

Read More
July 11, 2022
A Ransomware Refund?

One of the biggest internal debates facing ransomware recovery planners is whether to pay an extortion demand or fall back on a process of internal data recovery.Increasingly, however, victims who decide to pay face a second and potentially complex question: is it worth trying to retrieve a ransom after it has been paid?For years, this […]

Read More
June 30, 2022
Ransomware Group Offers Bounty To Find Its Own Bugs

A critical and often underestimated resource in the fight against malware is the industry’s history of finding and reporting software flaws in everything from big-brand programs to websites and software APIs.Many software companies and a few larger enterprises run dedicated programs that offer massive rewards for researchers opting for this type of work, sometimes running […]

Read More
June 29, 2022
The Limitations of Honeypots for Ransomware

There is a definite cool factor concerning the use of honeypots to hunt down an elusive hacker. Deploying a honeypot or two across your network is like creating a spy network within your organization that works undercover to help take down the bad guys.But while a honeypot does have a place within an effective defense […]

Image of The Limitations of Honeypots for Ransomware
Read More
June 28, 2022
Black Basta Ransomware Targets VMware Servers

Ransomware targeting VMware hosts is rapidly on the rise, and Black Basta is one of the latest jumping on the bandwagon.Like most ransomware, this relative newcomer first targeted Windows systems, but the Uptycs Threat Research team recently discovered a fresh Linux variant a few months later, developed by the same authors, which specifically targets VMware […]

Ransomware Spelled Out In an Image
Read More
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram
Share via
Copy link
Powered by Social Snap