Srujan LanderiforLanderi Srujansrujanlanderi.hashnode.net·Apr 20, 2023Understanding the Difference: Viruses, Malware, and RansomwareIntroduction I always thought that the terms Virus, Malware, and Ransomware were used interchangeably, until my esteemed mentor inquired about their meaning, prompting me to realize that they are different. It is important to understand their differe...Discuss·10 likescybersecurity
Mihnea Octavian ManolacheforMihnea's Blogmihnea.hashnode.net·Jul 27, 2022Simple Python RansomwareRansomware attacks have been one of the most lucrative businesses for cyber criminals in the past decade. Being passionate about cybersecurity, my approach has always been to learn by doing things myself. So I have decided to build a ransomware on my...Discuss·1.7K readsPython
Nnamani FidelisforWaldo's Pagecybernetacks.hashnode.net·Aug 22, 2022Ransomware Attacks in the African Ecosystem, and all you should know about the Conti RansomwareWhile social engineering remains the most popular attack vector in Africa, a study by Interpol found that instances of ransomware and botnet attacks are also rising. Ransomware is the fourth most prevalent cyber-attack identified in the report, which...Discuss·29 reads#cybersecurity
Srujan LanderiforLanderi Srujansrujanlanderi.hashnode.net·Apr 20, 2023Understanding the Difference: Viruses, Malware, and RansomwareIntroduction I always thought that the terms Virus, Malware, and Ransomware were used interchangeably, until my esteemed mentor inquired about their meaning, prompting me to realize that they are different. It is important to understand their differe...Discuss·10 likescybersecurity
Shahidforshahidshahid.hashnode.net·Apr 13, 2023Ransomware: Protect Your DataBase From Ransomware attackThe popularity of database platforms has attracted cybercriminals, who are always finding new ways to cause havoc. Ransomware is a type of malware that encrypts data, making it inaccessible and crippling organizations. Paying the ransom doesn't guara...DiscussSecurity
Kerwinfortriminator.hashnode.net·Jan 23, 2023WCB#4-Ransomware Attack on Maritime softwareWeekly Recap From credential stuffing attacks to ransomware attacks, this week in Cyber saw a plethora of eye-catching stories. Some of these stories include: Mailchimp being the victim of a data breach - The email marketing-based company was hit by...DiscussWeekly Cyber Briefransomware
Sajith KforSajith Kiamsajithk.hashnode.net·Jan 22, 2023The evolution of cybersecurity and the challenges companies will face in protecting their dataCybersecurity has come a long way since the early days of the internet. In the past, the primary concern was protecting against simple hacking attempts and viruses. However, as technology has advanced and the amount of data being stored and shared on...Discusscyber security
Jayson Suggsforjsuggs1203.hashnode.net·Jan 3, 2023How to Prevent, Detect, and Unlock Cerber RansomwareCerber Ransomware is a type of malicious software that infects computers, encrypts data, and then demands payment in order to unlock the files. It has been around since 2016 and continues to be one of the most dangerous types of malware. Although it ...Discuss·26 readsransomware
Amari JohnforAmari Johnamarijohn1203.hashnode.net·Dec 15, 2022What You Need to Know About Netwalker RansomwareNetwalker Ransomware is an increasingly prevalent form of malicious software that targets individuals and organizations alike. Ransomware is a type of malicious software (malware) designed to block access to data or systems until the victim pays a ra...Discuss·41 readsransomwareattack
Hasan MahmudforCyber Aeronautycs Ltd. Blogsecrooq.hashnode.net·Oct 2, 2022Paying ransomware demands has legal ramifications: Ransomware's Changing StateThe legal ramifications of paying or refusing to pay ransomware demands loom over organizations like a specter as assaults become more common and sophisticated. According to the Acronis Cyberthreats Report 2022, ransomware remains the #1 threat to SM...Discuss·26 readscyber attack
Nnamani FidelisforWaldo's Pagecybernetacks.hashnode.net·Aug 22, 2022Ransomware Attacks in the African Ecosystem, and all you should know about the Conti RansomwareWhile social engineering remains the most popular attack vector in Africa, a study by Interpol found that instances of ransomware and botnet attacks are also rising. Ransomware is the fourth most prevalent cyber-attack identified in the report, which...Discuss·29 reads#cybersecurity
Akhere Sonny-EgbeahieforJust a Security Blogakhere.hashnode.net·Aug 21, 2022Case study: Ransomware CIRPI recently applied for a Cybersecurity Internship and one of the pre-interview tasks was to prepare a Cyber Incident Response Plan for a Ransomware attack. I would be sharing my response with you. CASE STUDY: Since 10 am, your organization’s service ...Discuss·104 readsransomware
Mihnea Octavian ManolacheforMihnea's Blogmihnea.hashnode.net·Jul 27, 2022Simple Python RansomwareRansomware attacks have been one of the most lucrative businesses for cyber criminals in the past decade. Being passionate about cybersecurity, my approach has always been to learn by doing things myself. So I have decided to build a ransomware on my...Discuss·1.7K readsPython