
What is ransomware? - IBM
Ransomware is a type of malware that holds a victim’s sensitive data or device hostage, threatening to keep it locked—or worse—unless the victim pays a ransom to the attacker.
When ransomware kills: Attacks on healthcare facilities - IBM
As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the …
Roundup: The top ransomware stories of 2024 - IBM
With the competence, aggression and unpredictability of ransomware attacks on the rise, our top ransomware stories of 2024 shed insight into the future.
The current state of ransomware: Weaponizing disclosure rules and
The current state of ransomware: Weaponizing disclosure rules and more | IBMOne of the most significant developments in the ransomware landscape has been the use of artificial intelligence (AI) …
What is ransomware as a service (RaaS)? - IBM
Ransomware as a service (RaaS) is a cybercrime business model where ransomware developers sell ransomware code or malware to other hackers, called affiliates.
How to Recover From a Ransomware Attack | IBM
With ransomware becoming more prevalent, learn how your organization can swiftly respond to these cyberattacks.
Wannacry: how the widespread ransomware changed cybersecurity - IBM
May 12, 2020 · WannaCry ransomware transformed how enterprise defends against viruses and ransomware, and changed security teams' idea of what threat actors want.
What is scareware? - IBM
Scareware and ransomware Hackers may use scareware tactics to spread ransomware, a type of malware that holds devices or files hostage and demands a ransom. Convincing victims to download …
Ransomware on the rise: Healthcare industry attack trends 2024
Here's what healthcare organizations need to know about why ransomware works so well, what attackers want and how past compromises drive trends.
Types of Cyberthreats | IBM
Unpack the many and varied types of cybersecurity threats organizations face today—and the threat actors behind them.