LIVE NEWSROOM · --:-- · May 24, 2026
A LIBRARY FOR SECURITY RESEARCHERS

TOPICS  /  Ransomware

Ransomware

Understand, detect, and defend against ransomware and extortion.

Ransomware encrypts your files — and increasingly steals them first for double extortion. Operators break in through phishing, exposed remote access, or unpatched vulnerabilities, then move laterally before detonating across the network.

Here you’ll find the tools, references, and coverage to reduce ransomware risk: hash and IOC analysis, the catalog of actively-exploited vulnerabilities to patch first, and defense guidance.

Free tools

Latest coverage

Key terms

Reference databases

CISA KEV catalog  ·  MITRE ATT&CK

Scroll to Top