The Ultimate Guide to Ransomware
2025 edition
Overview
Ransomware is malware designed to virtually mimic the age-old crime of capturing items of value and demanding money for their safe return. Ransomware typically arrives via email or a backdoor, locks up valuable computer files, and is followed by a demand for compensation, often in Bitcoin or another cryptocurrency. The hacker promises a decryption tool on payment of the ransom – but there is never any guarantee of delivery or efficacy of the decryption tool.
Analyst reports
Canalys on Digital Transformation
Veritas wins Storage Partner of the Year at AWS awards
Last month
Gartner on Malware
Check Point Software named Visionary in 2024 Gartner re...
Fri, 27th Sep 2024
Gartner on ERP
Ransomware attacks increasingly target ERP systems
Thu, 29th Aug 2024
Forrester Wave on Malware
ColorTokens named leader in Forrester Wave for microseg...
Thu, 29th Aug 2024
IDC on Advanced Persistent Threat Protection
Ransomware attacks soar 63% in US, 67% in UK, says repo...
Thu, 22nd Aug 2024
Featured news
About Bank security
Exclusive: How Semperis is tackling identity-based cybe...
Last month
About Data breach
Exclusive: How KnowBe4 stopped a North Korean hacker fr...
Fri, 29th Nov 2024
About EduTech
Exclusive: Australians express rising concern over AI i...
Wed, 16th Oct 2024
About Threat intelligence
Exclusive: Mandiant Consulting highlights evolving cybe...
Fri, 11th Oct 2024
Expert columns
By Jake King of Elastic Security
Elastic Security's top three cybersecurity predictions ...
Last month
By Julian Fay of Senetas
Australia’s Cybersecurity Act races against augmented h...
Last month
By Lesley Carhart of Dragos
The imperative of cybersecurity in manufacturing
Last month
By Jon Fielding of Apricorn
Why companies must rethink their recovery plans
Last month
By Adam Barnett of Rapid7
December Patch Tuesday reveals 70 vulnerabilities
Last month
Interviews
Discussing Bank security
Exclusive: How Semperis is tackling identity-based cybe...
Last month
Discussing Data breach
Exclusive: How KnowBe4 stopped a North Korean hacker fr...
Fri, 29th Nov 2024
Discussing EduTech
Exclusive: Australians express rising concern over AI i...
Wed, 16th Oct 2024
Discussing Threat intelligence
Exclusive: Mandiant Consulting highlights evolving cybe...
Fri, 11th Oct 2024
Discussing Storage
Exclusive: Wasabi's Rob Waite discusses growth, cloud s...
Tue, 1st Oct 2024
More expert columns
By Sadiq Iqbal of Check Point Software Technologies
From deepfakes to ransomware: The key trends which will...
Last month
By Derek Manky of Fortinet
Threat predictions for 2025: Get ready for bigger, bold...
Fri, 29th Nov 2024
By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Thu, 14th Nov 2024
By Aaron Sharp of Verizon
How data breaches erode trust and what companies can do
Fri, 8th Nov 2024
By Ashley Diffey of Ping Identity
Three phases in the evolving Australian business conver...
Fri, 11th Oct 2024
By Mark Bowling of ExtraHop
Visibility is vital for detecting ransomware attacks
Tue, 8th Oct 2024
Recent news
About Firewalls
CloudSEK report reveals surge in complex cyber threats
5 days ago
About Data Analytics
Opswat acquires Fend to enhance cybersecurity for infra...
Last week
About Malware
Kaspersky reports 135% rise in crypto-drainer discussio...
Last week
About Cloud Services
Data protection advancements expected to shape 2025 sec...
Last week
About Data Protection
Trend Micro warns of AI-driven cyber threats by 2025
Last month
More news
About Firewalls
Cybercriminals increasingly exploit trusted apps, says ...
Last month
About EduTech
CSIS report reveals surge in sophisticated cyber threat...
Last month
About Malware
Ransomware report reveals evolving threat landscape in ...
Last month
About Multi-factor authentication
Manufacturing sector hit hardest by ransomware in 2024
Last month
About Renewable energy
Spearphishing identified as leading threat to utilities
Last month
Even more news
About Malware
2024 cyber threat landscape highlights key attack trend...
Last month
About Smartphones
Arctic Wolf to acquire Cylance from BlackBerry for USD ...
Last month
About Patching
Cybersecurity trends 2025: AI, supply chains, resilienc...
Last month
About AI Security
Business leaders tackle tech obsolescence & regulation ...
Last month
About Data Protection
Cybersecurity risks rise during mergers & acquisitions
Last month
Job moves
Move at Fujitsu
OpSys appoints Shanna Daly as first Chief Security Offi...
Mon, 28th Oct 2024
Move at Sophos
Sophos appoints new Chief Revenue Officer & VP of Sales
Thu, 24th Oct 2024
Move at Sophos
Sophos appoints Teresa Anania as new Chief Customer Off...
Tue, 23rd Jul 2024
Move at NetApp
Mark Fioretto named NetApp's new VP for Australia & New...
Tue, 16th Jul 2024
Move at Commvault
Commvault appoints Russell as CTO for APAC to boost cyb...
Mon, 27th May 2024
Other guides
You can read other related guides from Cybersecurity, Malware, Breach Prevention, Advanced Persistent Threat Protection, and Artificial Intelligence.
Powered by