Cybercriminals are taking cues from legitimate enterprises and focusing on growing their operations. Different variations of ransomware-as-a-service show the evolving nature of the business.
From familiar ransomware families resurfacing with new and improved variants, to older families inspiring new ones, and even new business models, here's a review of ransomware activity seen last week.
Ransomware and BEC scams lead the wave of threats that are turning 2016 into the Year of Online Extortion. Learn how these have changed the landscape and how organizations can protect themselves in our midyear security roundup.
Much of the coverage on ransomware either focuses on how it arrives in a system and the damaging repercussions that comes after. But what happens in between? Here's what happens in the background, before victims see the ransom note.
Need to know what ransomware is all about? How can ransomware infect your system, or how to prevent ransomware from entering your network? Here are some of the most frequently asked questions on the topic.
Various business websites were recently hijacked to deliver crypto-ransomware to visitors. Why do attackers repeat the cycle of compromising legitimate websites via exploit kits, malware and vulnerable software?