The Ultimate Guide to Ransomware
2025 edition
Overview
Ransomware is malware designed to virtually mimic the age-old crime of capturing items of value and demanding money for their safe return. Ransomware typically arrives via email or a backdoor, locks up valuable computer files, and is followed by a demand for compensation, often in Bitcoin or another cryptocurrency. The hacker promises a decryption tool on payment of the ransom – but there is never any guarantee of delivery or efficacy of the decryption tool.
Analyst reports

Gartner on Cybersecurity
Safebreach launches platform for enterprise cyber risk ...
Last month

Gartner on DevOps
SafeBreach launches new exposure validation platform
Last month

Gartner on Advanced Persistent Threat Protection
Semperis achieves ARR milestone with USD $100 million m...
Fri, 31st Jan 2025

IDC MarketScape on Malware
Sophos MDR services protect 26,000 organisations global...
Tue, 14th Jan 2025

Canalys on Digital Transformation
Veritas wins Storage Partner of the Year at AWS awards
Thu, 5th Dec 2024
Expert columns

By Anthony Spiteri of Veeam
Government Strategies Against Cybercrime: A Deep Dive
Today

By Simon Pamplin of Certes
Beyond ransomware payments: A proactive approach to cyb...
Last month

By Jason Whyte of Trustwave
How to outsmart ransomware and build resilience within ...
Last month

By Steve Stone of SentinelOne
Cybersecurity in 2025: A Landscape of Evolving Threats ...
Thu, 30th Jan 2025

By Martin Zugec of Bitdefender
Cybersecurity predictions 2025: Hype vs. reality
Fri, 17th Jan 2025
Interviews

Discussing Firewalls
Exclusive: SonicWall’s Yuvraj Pradhan discusses 2025 se...
Thu, 23rd Jan 2025

Discussing Firewalls
Exclusive: SonicWall VP outlines cybersecurity evolutio...
Fri, 17th Jan 2025

Discussing Bank security
Exclusive: How Semperis is tackling identity-based cybe...
Mon, 16th Dec 2024

Discussing Data breach
Exclusive: How KnowBe4 stopped a North Korean hacker fr...
Fri, 29th Nov 2024

Discussing EduTech
Exclusive: Australians express rising concern over AI i...
Wed, 16th Oct 2024
More expert columns

By Mark Baker of Check Point Software Technologies
The role of the board in shaping resilient cybersecurit...
Wed, 15th Jan 2025

By Stephen Kho of Avast
Ransomware is doubling down — What you need to know abo...
Tue, 7th Jan 2025

By Jake King of Elastic Security
Elastic Security's top three cybersecurity predictions ...
Tue, 17th Dec 2024

By Julian Fay of Senetas
Australia’s Cybersecurity Act races against augmented h...
Mon, 16th Dec 2024

By Lesley Carhart of Dragos
The imperative of cybersecurity in manufacturing
Fri, 13th Dec 2024

By Jon Fielding of Apricorn
Why companies must rethink their recovery plans
Thu, 12th Dec 2024
Recent news

About Firewalls
ReliaQuest report reveals rapid evolution in cyber thre...
Last week

About Malware
Cybercrime report reveals 58% surge in APT activity
Last week

About Threat intelligence
Ransomware attacks reach record levels in January 2025
Last week

About 3D Printing
Trustwave highlights cybersecurity risks in manufacturi...
Last week

About Firewalls
Ransomware tactics evolve, posing challenges for MSPs
Last week
More news

About Cybercrime
Cybercriminals adapt strategies to evade stronger defen...
Last week

About Sustainability
Malaysia's digital economy driven by AI & cybersecurity
Last week

About Firewalls
Cybersecurity expert calls for shift to data-centric de...
Last week

About Malware
Dragos report reveals rise in industrial cyber threats
Last week

About Firewalls
Fortinet achieves IRAP assessment on Google Cloud platf...
Last week
Even more news

About Malware
FBI & CISA warn of Ghost ransomware threats worldwide
Last week

About Phishing
NormCyber to host cyber event for Yorkshire businesses
Last month

About Data breach
Healthcare tops data breach incidents in 2024, surpassi...
Last month

About Business Intelligence
KnowBe4 platform promises up to 400% return on investme...
Last month

About Data breach
Semperis stresses risk for healthcare organisations ami...
Last month
Job moves

Move at Cohesity
Cohesity strengthens security with new advisory additio...
Fri, 17th Jan 2025

Move at Fujitsu
OpSys appoints Shanna Daly as first Chief Security Offi...
Mon, 28th Oct 2024

Move at Sophos
Sophos appoints new Chief Revenue Officer & VP of Sales
Thu, 24th Oct 2024

Move at Sophos
Sophos appoints Teresa Anania as new Chief Customer Off...
Tue, 23rd Jul 2024

Move at NetApp
Mark Fioretto named NetApp's new VP for Australia & New...
Tue, 16th Jul 2024
Other guides
You can read other related guides from Cybersecurity, Malware, Breach Prevention, Advanced Persistent Threat Protection, and Artificial Intelligence.
Powered by