Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » ransomware

Articles Tagged with ''ransomware''

Unprepared Companies Vulnerable to Ransomware Attacks

Two Manitoba, Canada Law Firms Hit by Maze Ransomware

April 15, 2020
Two unnamed Manitoba, Canada law firms have been hit by a Maze ransomware attack which has locked their computers and their cloud backup. 
Read More
Unprepared Companies Vulnerable to Ransomware Attacks

Nefilim Ransomware Threatens to Release Data

March 26, 2020
A new ransomware called Nefilim that shares much of the same code as Nemty has started to become active and threatens to release stolen data.
Read More
ransomware

Ransomware: Avoid Becoming the Next Victim

New Stu Sjouwerman CEO KnowBe4.jpg
Stu Sjouwerman
March 18, 2020

Ransomware has quickly emerged as a massive cybersecurity threat and is evolving continuously. Certainly, recent ransomware incidents should serve as a wake-up call for all businesses to remain vigilant against ransomware. To minimize the chances of being victimized by ransomware means going back in time to understand how ransomware developed and how it evolved.


Read More
RSA 2017: The "Culture" of Cybersecurity Collaboration

Microsoft: New Wormable, Unpatched Bug in SMB File-Sharing System

March 12, 2020
Microsoft has published a security advisory, warning users that there is a remote code execution vulnerability in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests.
Read More
cyber_lock

The Necessary Evolution of SecOps to DevSecOps

Ariel Assaraf
March 10, 2020

By 2021, cybercrime will cost about 6 trillion dollars a year. With an ever-increasing amount of ways to connect to your network, IT security teams must be able to secure and mitigate this risk by prioritizing security concerns at earlier stages of the software development life cycle. 


Read More
Strong Cybersecurity: The Critical Role of Lifecycle Management - Security Magazine

Security Researcher Publishes Details About Zero-Day Vulnerability in Zoho Enterprise Product

March 6, 2020
A security researcher recently published details on Twitter about a zero-day vulnerability in a Zoho enterprise product.
Read More
hacker

Why Ethical Hacking? (The What and Why of Ethical Hacking)

reut hackmon
Reut Hackmon
March 5, 2020

Most people do not know that ethical hackers are people who are hired to think like a hacker or bad actor. They meticulously probe a company's systems to find any weaknesses and bring them to the attention of the business before the bad actors exploit them. Ethical hacking is an investment that companies in the modern world can't afford to do without.  


Read More
ransomware

Cybercriminals are Increasingly Turning to Ransomware as a Secondary Source of Income

March 4, 2020

Cybercriminals are increasingly turning to ransomware as a secondary source of income, says a new FireEye report.


Read More
SEC0419-leadership-feat-slide1_900px

Cloud Security Risks Will Be a Top Concern for Organizations in 2020

Data Privacy Compliance, Business Continuity Management Also High Priorities
cory cowgill
Cory Cowgill
February 28, 2020
Here, we detail six predictions that will concern most IT and senior management professionals in the coming year.
Read More
SEC0719-Privacy-Feat-slide1_900px

What Lessons Can We Takeaway from Las Vegas’ Recent Thwarted Cyberattack?

Jim Ivers
February 27, 2020
Picture this: a news story detailing a cyberattack in which no data was exfiltrated, thousands (or even millions) of credit card details weren’t stolen, and no data was breached. While this isn’t the type of headline we often see, it recently became a reality in Las Vegas.
Read More
Previous 1 2 … 61 62 63 64 65 66 67 68 69 … 73 74 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing