TOPICS / Ransomware
Ransomware
Understand, detect, and defend against ransomware and extortion.
Ransomware encrypts your files — and increasingly steals them first for double extortion. Operators break in through phishing, exposed remote access, or unpatched vulnerabilities, then move laterally before detonating across the network.
Here you’ll find the tools, references, and coverage to reduce ransomware risk: hash and IOC analysis, the catalog of actively-exploited vulnerabilities to patch first, and defense guidance.
Free tools
Latest coverage
- CISA Contractor Leaked AWS GovCloud Keys on GitHub for Six Months
- CVE-2026-20182: Cisco Catalyst SD-WAN CVSS 10.0 Auth Bypass Actively Exploited
- Instructure Removed from ShinyHunters' Leak Site as Canvas Breach Deadline Passes
- Costa Rica Joins Have I Been Pwned as the 42nd Government
- Operation HookedWing: 4-Year Phishing Campaign Hits 500+ Organizations Across Aviation, Energy, and Logistics
- Vercel's v0.dev AI Tool Weaponized for Phishing Campaigns Targeting Microsoft, Nike Users
- Canvas LMS Breach Escalates: 275M Records, 9,000 Schools, May 12 Ransom Deadline
- VoidStealer Bypasses Chrome App-Bound Encryption Without Code Injection or Privilege Escalation
Key terms
Reference databases