Posts by tag
Here we explain three types of incidents in which cybercriminals make use of ransomware: cybertheft, extortion, and sabotage of facilities.
Cybercriminals are now using hacking attacks and insider attacks to gain access to endpoints and extract data from within the organisations network. However, a data breach in which the data is held for ransom is not the same as a Ransomware attack.
A new ransomware associated with PlayerUnknown’s Battlegrounds (PUBG) is seemingly just a joke, as no money is demanded to release your files.