Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Ransomware

Below you will find reports with the tag of “Ransomware”

Thank you to CISA for sponsoring our efforts to expand our ransomware coverage!

image from 2018 Top Cybersecurity Threats

2018 Top Cybersecurity Threats

This year, NopSec predicts that the biggest cyber threats will be massive data breaches, ransomware, opportunistic crypto-mining attacks and IoT hacking.

(more available)
Added: March 6, 2019
image from Under The Hood Of Cyber Crime

Under The Hood Of Cyber Crime

From the report, “In the first installment of the 2019 Security Report ‘CyberAttack Trends Analysis’, we reviewed the latest trends and threats facing the IT security industry today. We assessed the major incidents that impacted organizations over the past year along with our commentary and insights regarding them. These trends fell into the categories of Cryptominers, Ransomware, Malware Methodology, Data Breaches, Mobile and Nation State Cyber Attacks. In this installment we zone in on an underlying trend that lies behind all of the above categories, the democratization of cyber crime.” Read on to find out more.

(more available)
Added: February 7, 2019
image from Health Care Cyber Breach Research Report for 2016

Health Care Cyber Breach Research Report for 2016

This report offers insight into Cyber Breaches and the health industry for 2016. It provides information on the important trends of 2016, medical device hijacks and the top ten health care cyber attacks of 2016.

(more available)
Added: February 6, 2019
image from Assault On Healthcare

Assault On Healthcare

This report offers some insight into Health Information Technology and the cybersecurity issues that plague that area.

Added: February 5, 2019
image from Ransomware A Growing Enterprise Threat

Ransomware A Growing Enterprise Threat

This report offers insight into Ransomware and explains the growing threat that impacts enterprise security.

Added: January 1, 2019
image from 2017 Threat Report Discussion Guide

2017 Threat Report Discussion Guide

The Cylance 2017 Threat Report offers valuable analysis on the current state of cybersecurity. The information provided in the report is unavailable anywhere else. This Cylance® study includes research and information drawn from internal data and feedback provided by Cylance customers. The report offers considerable insights into recent threat trends and related security issues.

(more available)
Added: December 29, 2018
image from Bad Rabbit: New Ransomware Wracking havoc

Bad Rabbit: New Ransomware Wracking havoc

This paper provides information on Bad Rabbit a new ransomware roving the internet.

Added: December 5, 2018
image from WannaCry: One Year Later

WannaCry: One Year Later

“Despite the massive impact the WannaCry ransomware attack had on businesses across the globe and the immediate changes to security practices following it, a year later businesses still have a reactive approach and struggle to implement comprehensive security policies that target employees and management. With cyber threats evolving so rapidly, businesses need to learn how to be quick on their toes and expedite the development and enforcement of cyber security policies to better prevent future breaches.”

(more available)
Added: November 29, 2018
image from How to Protect Your Networks from Ransomware

How to Protect Your Networks from Ransomware

This is a technical guidance document provided by the US Government. It provides an aggregate of already existing Federal government and private industry best practices and mitigation strategies focused on the prevention and response to ransomware incidents.

(more available)
Added: October 26, 2018
image from Ransomware: How Consumers And Businesses Value Their Data

Ransomware: How Consumers And Businesses Value Their Data

IBM fielded a US-based consumer and business research study to determine the value people place on data and their awareness and knowledge about ransomware. The results are alarming.

(more available)
Added: October 26, 2018
image from State of Malware

State of Malware

This report discusess malware attacks and data from the year 2016 and makes predictions for 2017.

Added: October 26, 2018
image from The 2017 Ransomware Survival Guide

The 2017 Ransomware Survival Guide

This guide offers help for surviving ransomware attacks.

Added: October 26, 2018
image from BTCWare Ransomware

BTCWare Ransomware

This paper takes a look at a smaller Ransomware family that has not received as much press as the other bigger ransomware families.

(more available)
Added: October 25, 2018
image from Defending Government Against Ransomware Attacks

Defending Government Against Ransomware Attacks

This paper takes a look at cloud sandboxing and how that can be used to protect governments from Ransomware.

Added: October 25, 2018
image from Quarterly Threat Summary Q3 2016

Quarterly Threat Summary Q3 2016

This Quarterly report offers key takeaways from the third Quarter of 2016. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 25, 2018
image from Ransomware and Businesses 2016

Ransomware and Businesses 2016

This report from Symantec gives a variety of information about ransomware. It gives an overview, discusses the factors driving the growth and persistence of ransomware, infection vectors, platforms affected, the major ransomware families and finally, how businesses are going to be impacted.

(more available)
Added: October 25, 2018
image from Ransomware: Past, Present and Future

Ransomware: Past, Present and Future

This paper details the history and abilities of Ransomware, and where it is headed in the coming years.

Added: October 25, 2018
image from Understanding the Depth of the Global Ransomware Problem

Understanding the Depth of the Global Ransomware Problem

This report presents the results of a survey undertaken in the United States, Canada, Germany and the United Kingdom on ransomware and related issues. The survey was conducted during June 2016 with 165 organizations in the United States, and 125 each in the other nations for a total of 540 surveys completed.

(more available)
Added: October 25, 2018
image from Evaluating The Customer Journey Of Crypto-Ransomware And The Paradox Behind It

Evaluating The Customer Journey Of Crypto-Ransomware And The Paradox Behind It

From the report, “We found the paradox of illicit, malicious activity juxtaposed with helpful customer service so interesting that we decided to evaluate the customer journeys of fi ve current ransomware families. From the fi rst ransom message to communicating with the criminals via their support channels, we wanted to see just how these gangs are doing with their customer journey – and whose is the best (or rather, least loathsome).”

(more available)
Added: October 24, 2018
image from ISTR Ransomware 2017

ISTR Ransomware 2017

This special report takes a specific look at Ransomware.

Added: October 24, 2018
image from Ransomware: Unlocking The Lucrative Criminal Business Model

Ransomware: Unlocking The Lucrative Criminal Business Model

This is a well written exclusive look at Ransomware.

Added: October 24, 2018
  • ««
  • «
  • 5
  • 6
  • 7
  • 8
  • 9
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)