Ransomware
Blog Posts
3 Ransomware Defense Strategies
This SEI Blog post covers strategies to mitigate RDP attacks & software vulnerabilities, and how to protect against data exfiltration after phishing defense.
• By Marisa Midler
In Reverse Engineering for Malware Analysis
![Marisa Midler](/media/images/thumb_big_m-midler_blog_authors.max-180x180.format-webp.webp)
Three Places to Start in Defending Against Ransomware
Learn three initial efforts for defending against ransomware in this informative SEI Blog post.
• By Timothy J. Shimeall
In CERT/CC Vulnerabilities
![Tim Shimeall](/media/images/thumb_big_t-shimeall_blog_autho.max-180x180.format-webp.webp)
Ransomware as a Service (RaaS) Threats
This blog post explores the economics behind why ransomware remains a top tool for cybercrime and presents the current active ransomware variants that utilize ransomware as a service (RaaS), a …
• By Marisa Midler
In CERT/CC Vulnerabilities
![Marisa Midler](/media/images/thumb_big_m-midler_blog_authors.max-180x180.format-webp.webp)
Ransomware: Best Practices for Prevention and Response
On May 12, 2017, in the course of a day, the WannaCry ransomware attack infected nearly a quarter million computers. WannaCry is the latest in....
• By Alexander Volynkin, Angela Horneman, Jose A. Morales
In Situational Awareness
![Alexander Volynkin](/media/images/thumb_big_a-volynkin_blog_autho.max-180x180.format-webp.webp)