The Ultimate Guide to Ransomware
2025 edition
Overview
Ransomware is malware designed to virtually mimic the age-old crime of capturing items of value and demanding money for their safe return. Ransomware typically arrives via email or a backdoor, locks up valuable computer files, and is followed by a demand for compensation, often in Bitcoin or another cryptocurrency. The hacker promises a decryption tool on payment of the ransom – but there is never any guarantee of delivery or efficacy of the decryption tool.
Analyst reports

Gartner on Malware
Why is ransomware still a thing in 2025?
This month

AV-TEST on Malware
Kaspersky wins nine AV-TEST awards for cybersecurity ex...
Last month

Gartner on Cybersecurity
Safebreach launches platform for enterprise cyber risk ...
Fri, 7th Feb 2025

Gartner on DevOps
SafeBreach launches new exposure validation platform
Thu, 6th Feb 2025

Gartner on Advanced Persistent Threat Protection
Semperis achieves ARR milestone with USD $100 million m...
Fri, 31st Jan 2025
Featured news

About Business Continuity
Exclusive: CyXcel urges UK firms to rethink supply chai...
Last week

About Shadow IT
Google Threat Intelligence explains China’s evolving cy...
Last month

About Data Protection
Exclusive: ThreatLocker's Danny Jenkins urges firms to ...
Last month

About Cloud Services
Exclusive: Why every day should be World Backup Day
Last month

About Cryptocurrency
Exclusive: Cyber threats escalate as Australian organis...
Thu, 6th Mar 2025
Expert columns

By Jamie Humphrey of Dell Technologies Australia & New Zealand
The Ransomware Threat: How to respond and protect your ...
Last week

By Gareth Cox of Exabeam
How businesses are fighting sophisticated cyber threats...
This month

By Horatiu Petrescu of Aura Information Security
Privacy Week: Sensitive information stored online can h...
This month

By Trevor Dearing of Illumio
Singapore Election a hotbed for cyberactivity: Are busi...
This month

By Saeed Abbasi of Qualys
Six cybersecurity trends you can't afford to ignore in ...
Last month
Interviews

Discussing Business Continuity
Exclusive: CyXcel urges UK firms to rethink supply chai...
Last week

Discussing Shadow IT
Google Threat Intelligence explains China’s evolving cy...
Last month

Discussing Data Protection
Exclusive: ThreatLocker's Danny Jenkins urges firms to ...
Last month

Discussing Cloud Services
Exclusive: Why every day should be World Backup Day
Last month

Discussing Cryptocurrency
Exclusive: Cyber threats escalate as Australian organis...
Thu, 6th Mar 2025
More expert columns

By Kirsten Chapman of Gallagher Security
What if security solutions could help your business rea...
Last month

By Victoria Boryaeva of Pulseway
Essential Eight: Full cyber resilience through complian...
Last month

By Chris Boyd of Rapid7
2025 Ransomware: Business as Usual, Business is Booming
Last month

By Rakesh Prabhakar of Zoho
How can small and medium businesses safeguard against r...
Last month

By Rashid Mohiuddin of Connected Health, Wavelink
How to protect legacy medical devices from modern cyber...
Last month

By Bryan Marlatt of CyXcel
Cyberattacks: A ticking time bomb for financial stabili...
Last month
Recent news

About Network Security
Cisco unveils Duo IAM to strengthen identity-based secu...
Today

About Data breach
AI-powered ransomware surge despite fewer ransoms paid
Today

About Malware
US charges Russian in Qakbot cybercrime, seizes USD $24...
Yesterday

About Local government
US government face surge in cyberattacks amid budget cu...
Yesterday

About Software-as-a-Service
Immersive unveils new OT cybersecurity training for ind...
Last week
More news

About Malware
Organisations boost AI security as data threats & risks...
Last week

About Cloud Services
AI-driven threats prompt IT leaders to rethink hybrid c...
Last week

About Malware
Ransomware attacks down 31% but retail sector hit hard
Last week

About Software Updates
Cloudflare, Microsoft & police disrupt global malware s...
Last week

About Restaurants
Cybercriminals industrialise attacks on hospitality sec...
Last week
Even more news

About IT Training
Ransomware attacks on industrial targets surge, AI tact...
Last week

About Cloud Services
Rubrik & Rackspace launch managed cyber recovery for cl...
Last week

About Business Continuity
Cohesity expands Google Cloud partnership for cyber res...
Last week

About Malware
Organisations prioritise AI security as GenAI adoption ...
Last week

About Cyber Threats
Arctic Wolf launches Incident360 Retainer for cyber res...
This month
Job moves

Move at Illumio
Former CIA Chief George Tenet joins Illumio board to bo...
Last month

Move at Cohesity
Cohesity strengthens security with new advisory additio...
Fri, 17th Jan 2025

Move at Fujitsu
OpSys appoints Shanna Daly as first Chief Security Offi...
Mon, 28th Oct 2024

Move at Sophos
Sophos appoints new Chief Revenue Officer & VP of Sales
Thu, 24th Oct 2024

Move at Sophos
Sophos appoints Teresa Anania as new Chief Customer Off...
Tue, 23rd Jul 2024
Other guides
You can read other related guides from Cybersecurity, Malware, Advanced Persistent Threat Protection, Breach Prevention, and Artificial Intelligence.
Powered by