Phishing emails behind notorious ransomware scams revealed

Get a glimpse at the phishing emails cybercriminals use to attack victims with Locky, CryptoLocker, TeslaCrypt and other forms of ransomware.

Ransomware developers learn from the mistakes of WannaCry, NotPetya

Ransomware developers are learning a lot from the flaws in WannaCry and NotPetya. Keep reading to learn more.

The evolution of a cybercrime: A timeline of ransomware advances

Cybersecurity expert Eric Vanderburg describes the many forms that ransomware has taken over the years. Learn more.

How to determine the true cost of a ransomware attack

Learn about several factors that add to the total cost of a ransomware attack.

The 6 stages of an Advanced Ransomware Threat attack

Cybersecurity expert Eric Vanderburg dissects a typical Advanced Ransomware Threat attack. Keep reading to learn more.

Ransomware threatens Linux servers, especially web servers

Cybercriminals are targeting Linux users with ransomware. Learn what to look out for and how to protect yourself today.

Tabletop simulation exercises speed up ransomware response

Cybersecurity expert Eric Vanderburg explains how tabletop simulation exercises can help your business get ready for ransomware.

4 questions to ask before launching a data protection strategy

Ask yourself these four questions before launching a ransomware protection strategy at your organization.

Mac users face increased ransomware threats

Apple is known for building secure devices, but don't get too complacent because ransomware attacks against Mac users are on the rise. Learn about the latest threats.

Karmen ransomware makes it easy for cybercriminals to launch attacks

A do-it-yourself software kit called Karmen allows just about anyone to launch ransomware attacks against businesses. Learn more.