Ransomware

Ransomware | News, how-tos, features, reviews, and videos

Compliance
ransomware hack

Computerworld > Microsoft OneDrive / Microsoft SharePoint

Ransomware could target OneDrive and SharePoint files by abusing versioning configurations

A proof-of-concept exploit could make Office 365 or Microsoft 365 documents stored on OneDrive or SharePoint inaccessible.

stress test2 linux penguin stress ball hand squeezing by digitalsoul getty images 1136841639

Nebulon bakes bare-metal Linux ransomware protection into the bootloader

The newest releases of Nebulon’s ImmutableBoot and TimeJump backup systems boast 'reboot-to-recover' functionality for Linux systems.

CSO  >  ransomware / security threat

Ransomware attacks are increasing with more dangerous hybrids ahead

The re-emergence of REvil and anticipated convergence with business email compromise actors are among reasons why ransomware gangs are still dangerous.

binary code, magnifying lens, skull and crossbones

11 infamous malware attacks: The first and the worst

Whether by dumb luck or ruthless skill, these malware attacks left their mark on the internet.

data pipeline primary

How the Colonial Pipeline attack has changed cybersecurity

On the one-year anniversary of the Colonial Pipeline attack, industry insiders reflect on the event's effect on cybersecurity practice and perception.

locked data / bitcoins

How the Russia-Ukraine war makes ransomware payments harder

The war in Ukraine has increased sanctions against paying ransom demands to cybercriminal groups and cryptocurrency intermediaries based in Russia.

locked data / bitcoins

Ransomware roundup: System-locking malware dominates headlines

From a new ransomware group that demands donations instead of cryptocurrency to the possible resurgence of an infamous gang, these are the stories that caught the attention of infosec pros.

ransomware breach hackers dark web

Conti ransomware explained: What you need to know about this aggressive criminal group

The Conti ransomware group is less likely to help victims restore encrypted files and more likely to leak exfiltrated data.

CostaRica on map of America

How Costa Rica found itself at war over ransomware

Costa Rica failed to implement the cyber-preparedness strategy that it laid out five years ago and now serves as an example not only to other Latin American nations but also to the world.

cso security hacker breach privacy ransomware malware attack gettyimages 1216075693 by towfiqu aham

New Linux-based ransomware targets VMware servers

Cheerscript plants double-extortion malware on ESXi servers.

Ransomware

Chaos ransomware explained: A rapidly evolving threat

The Chaos ransomware builder, now rebranded as Yashma, is quickly improving and being adopted by cybercriminal groups.

Multiple-exposure shot of a clock and calendar pages. [time / past / future / history / what's next]

WannaCry 5 years on: Still a top threat

As security pros reminisce about the ransomware’s anniversary, some note the more things change, the more they stay the same.

binary cyberattack cybersecurity hacked protected

CISOs worried about material attacks, boardroom backing

CISOs are also less concerned about ransomware attacks, but many says their organizations are still not properly prepared for them.

ransomware attack

What your cyber insurance application form can tell you about ransomware readiness

The annual cyber insurance application form shows what the carriers think you should be doing to best prevent and recover from ransomware attacks. Pay attention.

bank vault bank hacked breach security breach binary numbers by negative space and peshkov getty im

Cohesity launches FortKnox to protect data from ransomware attacks

The data management vendor is adding strong data isolation and recovery capabilities with its latest software-as-a-service release, FortKnox.

ransomware

9 most important steps for SMBs to defend against ransomware attacks

Here's how small- to medium-sized businesses can effectively protect their networks against the risk of ransomware without breaking their security budgets.

malware attack

New malware loader Bumblebee adopted by known ransomware access brokers

The Bumblebee downloader has deployed open-source penetration testing tools like Cobalt Strike and is delivered through spear-phishing campaigns.

money currency international denominations global currency by metamorworks getty images 1129515470

Ransomware plagues finance sector as cyberattacks get more complex

Cybercriminals have evolved from hacking wire transfers to targeting market data, as ransomware continues to hit financial firms, says a new VMware report. Here's what to do about it.

Load More
You Might Also Like