• Industrial Spy

    May 16 2022

    Industrial Spy: Selling Stolen Data to Competitors

    Industrial Spy is a new way of selling stolen data of victims to competitors. Companies can buy their competitors’ trade secrets for millions of dollars – or as little as $2.

  • True Cost of Ransomware

    May 9 2022

    Beyond the Ransom: The True Cost of Ransomware Attacks

    The True Cost of Ransomware Attacks highlights the downtime costs, reputational damage and the cost of new security implementations when trying to recover from a ransomware attack.

  • Insider Ransomware Groups

    March 7 2022

    The New Insider Threat: Are ransomware groups recruiting your employees?

    Ransomware groups are using increasingly sophisticated technology and infrastructure to carry out attacks while adopting new tactics to pressurize their victims such as recruiting your employees.

  • Ransomware Group Tactics

    February 22 2022

    Ransomware Group Tactics in 2022

  • Ransomware as a service

    February 15 2022

    Ransomware as a Service: Industrialized Cybercrime is the New Normal

    Industrialized cybercrime, critical infrastructure attacks and sky-high ransoms are just the beginning of ransomware as a service business models.

  • 2021 ransomware attack report

    January 13 2022

    2021 Ransomware Attack Report

    In 2020 and 2021 BlackFog measured publicly disclosed attacks globally. The 2021 ransomware attack report summarizes these findings and highlights the key trends as we enter 2022.

  • Ransomware 2021

    January 4 2022

    The State of Ransomware in 2021

    Following on from our State of Ransomware 2020 blog, we’ll be tracking the 2021 publicized ransomware attacks each month to share with you via this blog.  This year we expect the number of attacks to increase and newer forms to become more sophisticated and disruptive.

  • Ransomware Attack Tools

    June 22 2021

    Anonymous Ransomware Attack Tools

  • Data Theft Extortion

    May 18 2021

    The Shift from Ransomware to Data Theft Extortion

    With data theft extortion, instead of a single ransom demand, there may be hundreds or thousands. In most cases, cybercriminals are adopting a dual-revenue model where a single, large-scale ransom demand is accompanied by individual ransoms for affected parties.

  • Ransomware Myths

    May 10 2021

    Top 5 Ransomware Myths

    In this blog we’ll look at some of the ransomware myths and how data exfiltration prevention can facilitate compliance and mitigate risks associated with an attack.