26.12.20 | Cybereason vs. Clop Ransomware | Ransomware blog | Cybereason |
12.12.20 | Threat Assessment: Egregor Ransomware | Ransomware blog | Palo Alto Unity42 |
12.12.20 | Cybereason vs. Ryuk Ransomware | Ransomware blog | Cybereason |
5.12.20 | The year of fake news, Covid-19 scams and ransomware | Ransomware blog | Avast blog |
5.12.20 | Cybereason vs. Egregor Ransomware | Ransomware blog | Cybereason |
21.11.20 | Cybereason vs. MedusaLocker Ransomware | Ransomware blog | Cybereason |
21.11.20 | Nibiru ransomware variant decryptor | Ransomware blog | Cisco Talos |
14.11.20 | Pay2Key – The Plot Thickens | Ransomware blog | Checkpoint |
7.11.20 | Back to the Future: Inside the Kimsuky KGH Spyware Suite | Ransomware blog | Cybereason |
7.11.20 | Law Enforcement Warns of Imminent Ransomware Threat to U.S. Hospitals | Ransomware blog | Cybereason |
7.11.20 | Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser | Ransomware blog | FireEye |
7.11.20 | Ransomware Alert: Pay2Key | Ransomware blog | Checkpoint |
30.10.20 | Threat Assessment: Ryuk Ransomware and Trickbot Targeting U.S. Healthcare and Public Health Sector | Ransomware blog | Palo Alto Unity42 |
30.10.20 | Ryuk Ransomware: Mitigation and Defense Action Items | Ransomware blog | Cybereason |
30.10.20 | Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser | Ransomware blog | FireEye |
17.10.20 | Ransomware: How It Has Evolved to Be Faster, Stealthier, and Strike Harder | Ransomware blog | F5 Labs |
17.10.20 | FIN11: Widespread Email Campaigns as Precursor for Ransomware and Data Theft | Ransomware blog | FireEye |
10.10.20 | US gov’t warns against paying off ransomware attackers | Ransomware blog | Eset |
3.10.20 | GERMAN RANSOMWARE ATTACK: A RALLYING CRY FOR BULLISH DILIGENCE | Ransomware blog | Cybereason |
26.9.20 | GERMAN RANSOMWARE ATTACK: A RALLYING CRY FOR BULLISH DILIGENCE | Ransomware blog | Cybereason |
26.9.20 | Ray‑Ban parent company reportedly suffers major ransomware attack | Ransomware blog | Eset |
19.9.20 | Sports data for ransom – it’s not all just fun and games anymore | Ransomware blog | Eset |
5.9.20 | Thanos Ransomware: Destructive Variant Targeting State-Run Organizations in the Middle East and North Africa | Ransomware blog | Palo Alto Unity42 |
30.8.20 | DoppelPaymer: The latest ransomware innovation is all about distribution | Ransomware blog | Avast blog |
8.8.20 | What we can learn from the Garmin ransomware attack | Ransomware blog | Avast blog |
8.8.20 | Small and medium‑sized businesses: Big targets for ransomware attacks | Ransomware blog | Eset |
5.8.20 | Threat Assessment: WastedLocker Ransomware Activities | Ransomware blog | Palo Alto Unity42 |
5.8.20 | Six Hundred Million Reasons to Celebrate: No More Ransom Turns FOUR!! | Ransomware blog | Mcafee blog |
26.7.20 | Argentine telecom company hit by major ransomware attack | Ransomware blog | Eset |
19 .7.20 | RagnarLocker Ransomware Threatens to Release Confidential Information | Ransomware blog | Mcafee blog |
17 .7.20 | Thousands of MongoDB databases ransacked, held for ransom | Ransomware blog | Eset |
17 .7.20 | New ransomware posing as COVID‑19 tracing app targets Canada; ESET offers decryptor | Ransomware blog | Eset |
13 .7.20 | WHAT MODERN RANSOMWARE LOOKS LIKE | Ransomware blog | Cybereason |
13 .7.20 | RANSOMWARE: WEAPONS OF MASS DISRUPTION | Ransomware blog | Cybereason |
13 .7.20 | HOW TO DESIGN A PREVENTION STACK TO STOP RANSOMWARE | Ransomware blog | Cybereason |
13 .7.20 | CYBEREASON’S NEWEST HONEYPOT SHOWS HOW MULTISTAGE RANSOMWARE ATTACKS SHOULD HAVE CRITICAL INFRASTRUCTURE PROVIDERS ON HIGH ALERT | Ransomware blog | Cybereason |
12 .7.20 | Threat Assessment: EKANS Ransomware | Ransomware blog | Palo Alto Unity42 |
24.5.20 | Threat Brief: Maze Ransomware Activities | Ransomware blog | Palo Alto Unity42 |
23.5.20 | Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware Incidents | Ransomware blog | FireEye |
17.5.20 | We never wanna repeat WannaCry | Ransomware blog | Avast blog |
16.5.20 | The basics of a ransomware infection as Snake, Maze expands | Ransomware blog | Cisco Talos |
16.5.20 | Threat Spotlight: Astaroth — Maze of obfuscation and evasion reveals dark stealer | Ransomware blog | Cisco Talos |
16.5.20 | WannaCryptor remains a global threat three years on | Ransomware blog | Eset |
9.5.20 | ENS 10.7 Rolls Back the Curtain on Ransomware | Ransomware blog | Mcafee blog |
9.5.20 | Tales From the Trenches; a Lockbit Ransomware Story | Ransomware blog | Mcafee blog |
9.5.20 | Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware Incidents | Ransomware blog | FireEye |
2.5.20 | Lucy’s Back: Ransomware Goes Mobile | Ransomware blog | Checkpoint |
25.4.20 | Ransomware: Local Government in the Firing Line | Ransomware blog | F5 Labs |
19.4.20 | The New Front in Hospitals’ Battle Against COVID-19: Ransomware | Ransomware blog | Sonicwall |
18.4.20 | Ransomware Evolved: Double Extortion | Ransomware blog | Checkpoint |
12.4.20 | The New Front in Hospitals’ Battle Against COVID-19: Ransomware | Ransomware blog | Sonicwall |
11.4.20 | INSIGHTS FROM A FIRESIDE CHAT ON RANSOMWARE, CLOUD ADOPTION, & CISOS | Ransomware blog | Cybereason |
4.4.20 | Nemty Ransomware – Learning by Doing | Ransomware blog | Mcafee blog |
28.3.20 | Ransomware Maze | Ransomware blog | Mcafee blog |
21.3.20 | They Come in the Night: Ransomware Deployment Trends | Ransomware blog | FireEye |
7.3.20 | Video: What defenders can learn from past ransomware attacks | Ransomware blog | Eset |
29.2.20 | Ransomware Against the Machine: How Adversaries are Learning to Disrupt Industrial Production by Targeting IT and OT | Ransomware blog | FireEye |
25.1.20 | Nice Try: 501 (Ransomware) Not Implemented | Ransomware blog | FireEye |
18.1.20 | Security Lessons from Across the Pond: Local Government Ransomware Attacks | BigBrother blog Ransomware blog | F5 Labs |
5.1.20 | Ransomware attackers wish victims happy holidays, offer discounts | Ransomware blog | Avast blog |
| | | |