Cybercriminals are leveraging pen testing tools and white-hat best practices to deliver advanced ransomware that has longer life spans and bigger payouts.
Your Guide To Ransomware Penetration Testing
Trick or Threat: Diving into Spooky Techniques of Ransomware Groups
Why Ransomware Organizations Target Local Active Directory
BlueHat v17, Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging Ransomware Attacks in History
Trick or Threat: Diving into Spooky Techniques of Ransomware Groups
Ransomware prevention for MSPs: Tips and best practices
WormGPT: An Emerging Black-Hat Tool Paving the Way for AI Malware vs. AI Defenses
The Future of Malware: Predictions and Prevention Measures
End2End Framework for Android Malware Detection
TeslaCrypt - Security Intelligence
The Crucial Role of Regular Penetration Testing for Businesses
Applying staged event-driven access control to combat ransomware - ScienceDirect
The attacker's toolkit: Ransomware-as-a-service