The Ultimate Guide to Ransomware
2025 edition
Overview
Ransomware is malware designed to virtually mimic the age-old crime of capturing items of value and demanding money for their safe return. Ransomware typically arrives via email or a backdoor, locks up valuable computer files, and is followed by a demand for compensation, often in Bitcoin or another cryptocurrency. The hacker promises a decryption tool on payment of the ransom – but there is never any guarantee of delivery or efficacy of the decryption tool.
Analyst reports

Gartner on Malware
Why is ransomware still a thing in 2025?
Last week

AV-TEST on Malware
Kaspersky wins nine AV-TEST awards for cybersecurity ex...
Last month

Gartner on Cybersecurity
Safebreach launches platform for enterprise cyber risk ...
Fri, 7th Feb 2025

Gartner on DevOps
SafeBreach launches new exposure validation platform
Thu, 6th Feb 2025

Gartner on Advanced Persistent Threat Protection
Semperis achieves ARR milestone with USD $100 million m...
Fri, 31st Jan 2025
Featured news

About Shadow IT
Google Threat Intelligence explains China’s evolving cy...
Last month

About Data Protection
Exclusive: ThreatLocker's Danny Jenkins urges firms to ...
Last month

About Cloud Services
Exclusive: Why every day should be World Backup Day
Last month

About Cryptocurrency
Exclusive: Cyber threats escalate as Australian organis...
Thu, 6th Mar 2025
Expert columns

By Jamie Humphrey of Dell Technologies Australia & New Zealand
The Ransomware Threat: How to respond and protect your ...
3 days ago

By Gareth Cox of Exabeam
How businesses are fighting sophisticated cyber threats...
Last week

By Horatiu Petrescu of Aura Information Security
Privacy Week: Sensitive information stored online can h...
This month

By Trevor Dearing of Illumio
Singapore Election a hotbed for cyberactivity: Are busi...
This month

By Saeed Abbasi of Qualys
Six cybersecurity trends you can't afford to ignore in ...
Last month
Interviews

Discussing Shadow IT
Google Threat Intelligence explains China’s evolving cy...
Last month

Discussing Data Protection
Exclusive: ThreatLocker's Danny Jenkins urges firms to ...
Last month

Discussing Cloud Services
Exclusive: Why every day should be World Backup Day
Last month

Discussing Cryptocurrency
Exclusive: Cyber threats escalate as Australian organis...
Thu, 6th Mar 2025

Discussing Firewalls
Exclusive: SonicWall’s Yuvraj Pradhan discusses 2025 se...
Thu, 23rd Jan 2025
More expert columns

By Kirsten Chapman of Gallagher Security
What if security solutions could help your business rea...
Last month

By Victoria Boryaeva of Pulseway
Essential Eight: Full cyber resilience through complian...
Last month

By Chris Boyd of Rapid7
2025 Ransomware: Business as Usual, Business is Booming
Last month

By Rakesh Prabhakar of Zoho
How can small and medium businesses safeguard against r...
Last month

By Rashid Mohiuddin of Connected Health, Wavelink
How to protect legacy medical devices from modern cyber...
Last month

By Bryan Marlatt of CyXcel
Cyberattacks: A ticking time bomb for financial stabili...
Last month
Top players
Recent news

About Business Continuity
Cohesity expands Google Cloud partnership for cyber res...
Yesterday

About Malware
Organisations prioritise AI security as GenAI adoption ...
2 days ago

About Cyber Threats
Arctic Wolf launches Incident360 Retainer for cyber res...
Last week

About Endpoint Protection
Morphisec launches KICKSTART Channel Program to boost c...
Last week

About Software-as-a-Service
AI & sustainability driving India's technology transfor...
Last week
More news

About Threat intelligence
Scattered Spider & DragonForce target UK retail in new ...
Last week

About Software-as-a-Service
Cybersecurity spend to surpass $200B as risks surge
Last week

About Data Protection
Andy Frain notifies 100,000 after major ransomware brea...
Last week

About Cloud Services
Cyber resilience urged as ransomware costs hit AUD $3 b...
Last week

About Cloud Services
Broadcom forces VMware clients to roll back crucial upd...
This month
Even more news

About Malware
CyXcel earns CREST accreditation for cyber incident res...
This month

About Multi-factor authentication
Scattered Spider exploited UK retailer service desks
This month

About Unified Communications
Slow broadband costing UK businesses GBP £11 billion ea...
This month

About IT Training
Rise in AI-driven cyberattacks prompts urgent action fo...
This month

About Phishing
Harrods cyber attack spotlights retailer risk amid cutb...
This month
Job moves

Move at Illumio
Former CIA Chief George Tenet joins Illumio board to bo...
Last month

Move at Cohesity
Cohesity strengthens security with new advisory additio...
Fri, 17th Jan 2025

Move at Fujitsu
OpSys appoints Shanna Daly as first Chief Security Offi...
Mon, 28th Oct 2024

Move at Sophos
Sophos appoints new Chief Revenue Officer & VP of Sales
Thu, 24th Oct 2024

Move at Sophos
Sophos appoints Teresa Anania as new Chief Customer Off...
Tue, 23rd Jul 2024
Other guides
You can read other related guides from Cybersecurity, Malware, Advanced Persistent Threat Protection, Breach Prevention, and Artificial Intelligence.
Powered by