February 5 2025
Healthcare Under Siege: Ransomware Attacks Soared in 2024
Healthcare ransomware attacks surged in 2024, putting patient data and critical services at risk. Discover key stats, major incidents, and how healthcare organizations can defend against evolving cyber threats.
February 4 2025
The State of Ransomware 2025
BlackFog's state of ransomware report 2025 measures publicly disclosed and non-disclosed attacks globally.
January 31 2025
Malvertising: What is it and How Can it Lead to a Ransomware Attack?
What are the key things businesses need to know about ransomware removal and recovery?
January 30 2025
AWS Data Breach: Lesson From 4 High Profile Breaches
Take a look at 4 high-profile AWS data breaches, their root causes, and the vulnerabilities that made them possible. Learn about strategies to secure your cloud infrastructure and protect against similar risks.
January 20 2025
The 5 Biggest Ransomware Attacks of 2024
Cybersecurity was still very much dominated by ransomware attacks in 2024. In this article we look back at five of the most notable incidents of the year.
January 7 2025
The State of Ransomware 2024
BlackFog's state of ransomware report measures publicly disclosed and non-disclosed attacks globally.
December 31 2024
Ongoing: New Ransomware Gangs in 2024
Ransomware gangs continue to break records and BlackFog will track all new ransomware gangs in 2024.
December 31 2024
Ransomware Focus: LockBit Attacks in 2024
Latest information on all LockBit attacks both disclosed and undisclosed in 2024
December 19 2024
The Johnson Controls Ransomware Attack – Impact and Key Insights Review
In September 2023, Johnson Controls International suffered a ransomware attack linked to the Dark Angels group, resulting in the theft of 27TB of sensitive data. The breach caused $27 million in losses and disrupted operations, highlighting the critical need for robust cybersecurity defenses.
December 16 2024
The 2024 Vulnerability Crisis – Managing Cybersecurity Threats
Learn how organizations can meet the onslaught of cybersecurity vulnerabilities, along with five of the most common vulnerabilities and successful management strategies. Find out why there’s a new vulnerability every 17 minutes.