The Ultimate Guide to Ransomware
2025 edition
Overview
Ransomware is malware designed to virtually mimic the age-old crime of capturing items of value and demanding money for their safe return. Ransomware typically arrives via email or a backdoor, locks up valuable computer files, and is followed by a demand for compensation, often in Bitcoin or another cryptocurrency. The hacker promises a decryption tool on payment of the ransom – but there is never any guarantee of delivery or efficacy of the decryption tool.
Analyst reports

AV-TEST on Malware
Kaspersky wins nine AV-TEST awards for cybersecurity ex...
Last month

Gartner on Cybersecurity
Safebreach launches platform for enterprise cyber risk ...
Fri, 7th Feb 2025

Gartner on DevOps
SafeBreach launches new exposure validation platform
Thu, 6th Feb 2025

Gartner on Advanced Persistent Threat Protection
Semperis achieves ARR milestone with USD $100 million m...
Fri, 31st Jan 2025

IDC MarketScape on Malware
Sophos MDR services protect 26,000 organisations global...
Tue, 14th Jan 2025
Featured news

About Shadow IT
Google Threat Intelligence explains China’s evolving cy...
Last month

About Data Protection
Exclusive: ThreatLocker's Danny Jenkins urges firms to ...
Last month

About Cloud Services
Exclusive: Why every day should be World Backup Day
Last month

About Cryptocurrency
Exclusive: Cyber threats escalate as Australian organis...
Thu, 6th Mar 2025
Expert columns

By Saeed Abbasi of Qualys
Six cybersecurity trends you can't afford to ignore in ...
2 days ago

By Kirsten Chapman of Gallagher Security
What if security solutions could help your business rea...
3 days ago

By Victoria Boryaeva of Pulseway
Essential Eight: Full cyber resilience through complian...
4 days ago

By Chris Boyd of Rapid7
2025 Ransomware: Business as Usual, Business is Booming
Last month

By Rakesh Prabhakar of Zoho
How can small and medium businesses safeguard against r...
Last month
Interviews

Discussing Shadow IT
Google Threat Intelligence explains China’s evolving cy...
Last month

Discussing Data Protection
Exclusive: ThreatLocker's Danny Jenkins urges firms to ...
Last month

Discussing Cloud Services
Exclusive: Why every day should be World Backup Day
Last month

Discussing Cryptocurrency
Exclusive: Cyber threats escalate as Australian organis...
Thu, 6th Mar 2025

Discussing Firewalls
Exclusive: SonicWall’s Yuvraj Pradhan discusses 2025 se...
Thu, 23rd Jan 2025
More expert columns

By Rashid Mohiuddin of Connected Health, Wavelink
How to protect legacy medical devices from modern cyber...
Last month

By Bryan Marlatt of CyXcel
Cyberattacks: A ticking time bomb for financial stabili...
Last month

By William Oh of BlueVoyant
DBS & Bank of China Singapore hit by cyberattack
Last month

By Karthik Raju of Radware
The bot battle: How to defend against scraping attacks
Last month

By Oscar Morales of Calian IT & Cyber Solutions
Cloud security in 2025: Why proactive defense is critic...
Last month

By Peter Philipp of Neo4j
How graph databases are improving the resilience of sup...
Mon, 24th Mar 2025
Recent news

About Cloud Services
Rubrik & Rackspace team up for rapid post-cyber attack ...
Yesterday

About Phishing
Forrester warns of deepfakes & AI extortion in 2025 thr...
2 days ago

About Malware
Iberian blackout raises fears of growing cyber-attack r...
3 days ago

About Malware
APAC CIOs face cyber threats despite rising security sp...
3 days ago

About Data Protection
Commvault Cloud secures GovRAMP Authorised High impact ...
3 days ago
More news

About Data Protection
Commvault unveils enhanced Cleanroom Recovery to cut do...
3 days ago

About Cloud Security
AI enhances SOCs but human expertise vital against thre...
Last week

About Data Protection
SquareX raises USD $20M to boost enterprise browser sec...
Last week

About Data Protection
Veeam partners with CrowdStrike to boost data resilienc...
Last week

About Malware
Veeam report finds 69% of firms hit by ransomware in pa...
Last week
Even more news

About Malware
System intrusions cause 80% of Asia-Pacific data breach...
Last week

About Unified Communications
Proofpoint launches unified cybersecurity solution to c...
Last week

About Hyperscale
Cookie theft bypasses MFA and grants cloud access
Last week

About Malware
Nine in ten IT leaders faced cyberattacks as threats in...
Last week

About Data Protection
Nasuni sees 189% growth as AEC sector moves to hybrid c...
Last week
Job moves

Move at Illumio
Former CIA Chief George Tenet joins Illumio board to bo...
Last week

Move at Cohesity
Cohesity strengthens security with new advisory additio...
Fri, 17th Jan 2025

Move at Fujitsu
OpSys appoints Shanna Daly as first Chief Security Offi...
Mon, 28th Oct 2024

Move at Sophos
Sophos appoints new Chief Revenue Officer & VP of Sales
Thu, 24th Oct 2024

Move at Sophos
Sophos appoints Teresa Anania as new Chief Customer Off...
Tue, 23rd Jul 2024
Other guides
You can read other related guides from Cybersecurity, Malware, Advanced Persistent Threat Protection, Breach Prevention, and Artificial Intelligence.
Powered by