
Backing up is no panacea when blackmailers publish stolen data
Ransomware makers seem to be following a new trend, publishing data from companies that refuse to pay them.
20 articles
Ransomware makers seem to be following a new trend, publishing data from companies that refuse to pay them.
Industrial Norwegian giant Hydro hit by ransomware — security incident analysis.
Epidemics, espionage, destruction: We present the most memorable cyberattacks of recent years.
In the Netherlands, the creators of one of the first ransomware cryptors are on trial, thanks largely to us.
The Rakhni encrypting ransomware, known since 2013, is now trying its hand at mining Monero.
Belgian police and Kaspersky Lab obtain decryption keys for files hit by Cryakl.
The cryptomining boom is helping scammers make money out of thin air. The latest method involves fake currency and ransomware.
Next year is likely to see malware creators and distributors switch from ransomware to malicious Web miners.
Global IT security problems like the recent Petya attack are of clear concern to large corpora-tions — but they affect common people as well.
A new ransomware outbreak is happening right now. Here’s what we know so far and what you can do to protect yourself from the threat.
FAQ about ransomware: types, origins, dangers, and how you can stay safe.
Ransomware research shows that paying ransom is no guarantee you’ll get your files back.
Three months in, we report on the development of No More Ransom and the goals we’ve already achieved.
Polyglot, aka MarsJoke, had aspirations. It was trying to be the next CTB-Locker — but we developed a cure.
Fantom ransomware displays a fake Windows Update screen while encrypting your files.
Good news, everyone! We have help for victims of Shade ransomware. Now you can decrypt the data without paying ransom.
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
Ded Cryptor ransomware is based on EDA2 — an open-source cryptor. EDA2 was created for educational purposes, but then things went horribly wrong.
Where ransomware originates, how blockers evolve into cryptors, and why this type of malware is cybercriminals’ favorite tool.