The Ultimate Guide to Ransomware
2025 edition
Overview
Ransomware is malware designed to virtually mimic the age-old crime of capturing items of value and demanding money for their safe return. Ransomware typically arrives via email or a backdoor, locks up valuable computer files, and is followed by a demand for compensation, often in Bitcoin or another cryptocurrency. The hacker promises a decryption tool on payment of the ransom – but there is never any guarantee of delivery or efficacy of the decryption tool.
Analyst reports

Gartner on Cybersecurity
Safebreach launches platform for enterprise cyber risk ...
Last month

Gartner on DevOps
SafeBreach launches new exposure validation platform
Last month

Gartner on Advanced Persistent Threat Protection
Semperis achieves ARR milestone with USD $100 million m...
Fri, 31st Jan 2025

IDC MarketScape on Malware
Sophos MDR services protect 26,000 organisations global...
Tue, 14th Jan 2025

Canalys on Digital Transformation
Veritas wins Storage Partner of the Year at AWS awards
Thu, 5th Dec 2024
Featured news

About Cryptocurrency
Exclusive: Cyber threats escalate as Australian organis...
Last week

About Firewalls
Exclusive: SonicWall’s Yuvraj Pradhan discusses 2025 se...
Thu, 23rd Jan 2025

About Firewalls
Exclusive: SonicWall VP outlines cybersecurity evolutio...
Fri, 17th Jan 2025

About Bank security
Exclusive: How Semperis is tackling identity-based cybe...
Mon, 16th Dec 2024
Expert columns

By Gareth Russell of Commvault
Observations on the state of cyber readiness
5 days ago

By Anthony Spiteri of Veeam
Government Strategies Against Cybercrime: A Deep Dive
This month

By Simon Pamplin of Certes
Beyond ransomware payments: A proactive approach to cyb...
Last month

By Jason Whyte of Trustwave
How to outsmart ransomware and build resilience within ...
Last month

By Steve Stone of SentinelOne
Cybersecurity in 2025: A Landscape of Evolving Threats ...
Thu, 30th Jan 2025
Interviews

Discussing Cryptocurrency
Exclusive: Cyber threats escalate as Australian organis...
Last week

Discussing Firewalls
Exclusive: SonicWall’s Yuvraj Pradhan discusses 2025 se...
Thu, 23rd Jan 2025

Discussing Firewalls
Exclusive: SonicWall VP outlines cybersecurity evolutio...
Fri, 17th Jan 2025

Discussing Bank security
Exclusive: How Semperis is tackling identity-based cybe...
Mon, 16th Dec 2024

Discussing Data breach
Exclusive: How KnowBe4 stopped a North Korean hacker fr...
Fri, 29th Nov 2024
More expert columns

By Martin Zugec of Bitdefender
Cybersecurity predictions 2025: Hype vs. reality
Fri, 17th Jan 2025

By Mark Baker of Check Point Software Technologies
The role of the board in shaping resilient cybersecurit...
Wed, 15th Jan 2025

By Stephen Kho of Avast
Ransomware is doubling down — What you need to know abo...
Tue, 7th Jan 2025

By Jake King of Elastic Security
Elastic Security's top three cybersecurity predictions ...
Tue, 17th Dec 2024

By Julian Fay of Senetas
Australia’s Cybersecurity Act races against augmented h...
Mon, 16th Dec 2024

By Lesley Carhart of Dragos
The imperative of cybersecurity in manufacturing
Fri, 13th Dec 2024
Recent news

About Data Protection
Australia introduces new cybersecurity compliance laws ...
Yesterday

About Firewalls
Cyber threats from VPNs lead ransomware incidents in 20...
3 days ago

About Data Protection
Nasuni & CrowdStrike partner for enhanced threat detect...
3 days ago

About Malware
Microsoft & Fortra's joint fight against Cobalt Strike ...
3 days ago

About Malware
Rise in cyberattacks using legitimate RMM tools noted
3 days ago
More news

About Phishing
KnowBe4's global report finds rising cyber threats aime...
5 days ago

About Software-as-a-Service
Southern Cyber adopts Check Point's prevention strategy
Last week

About Malware
Small businesses targeted by cybercriminals on dark web
Last week

About Business Continuity
Cyber threats in Australian firms prompt zero trust shi...
Last week

About Firewalls
ReliaQuest report reveals rapid evolution in cyber thre...
Last month
Even more news

About Malware
Cybercrime report reveals 58% surge in APT activity
Last month

About Threat intelligence
Ransomware attacks reach record levels in January 2025
Last month

About 3D Printing
Trustwave highlights cybersecurity risks in manufacturi...
Last month

About Firewalls
Ransomware tactics evolve, posing challenges for MSPs
Last month

About Cybercrime
Cybercriminals adapt strategies to evade stronger defen...
Last month
Job moves

Move at Cohesity
Cohesity strengthens security with new advisory additio...
Fri, 17th Jan 2025

Move at Fujitsu
OpSys appoints Shanna Daly as first Chief Security Offi...
Mon, 28th Oct 2024

Move at Sophos
Sophos appoints new Chief Revenue Officer & VP of Sales
Thu, 24th Oct 2024

Move at Sophos
Sophos appoints Teresa Anania as new Chief Customer Off...
Tue, 23rd Jul 2024

Move at NetApp
Mark Fioretto named NetApp's new VP for Australia & New...
Tue, 16th Jul 2024
Other guides
You can read other related guides from Cybersecurity, Malware, Breach Prevention, Advanced Persistent Threat Protection, and Artificial Intelligence.
Powered by