GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Ransomware Content

#StopRansomware: RansomHub Ransomware

#StopRansomware: RansomHub Ransomware

The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency, the Multi-State Information Sharing and Analysis Center, and the Department of Health and Human Services are releasing this…

Learn More
#StopRansomware: Phobos Ransomware

#StopRansomware: Phobos Ransomware

Phobos is structured as a ransomware-as-a-service model. These incidents targeted municipal and county governments, emergency services, education, public healthcare, and other critical infrastructure entities to successfully ransom several million U.S.…

Learn More
Black Kite 2023 Ransomware Threat Landscape Report: Ransomware Resurgence

Black Kite 2023 Ransomware Threat Landscape...

In their inaugural Ransomware Threat Landscape Report, Black Kite Research conducted an analysis and gathering of ransomware attacks over the last year. The report examines the evolving landscape of ransomware…

Learn More
Avoiding Ransomware Checkmate

Avoiding Ransomware Checkmate

Cybercriminals are increasingly launching ransomware attacks on state & local governments and educational institutions because they know they are profitable targets. Stopping hackers before they gain access to your systems…

Learn More
Stop Ransomware: Ransomware Attacks on Critical Infrastructure Fund DPRK Malicious Cyber Activities

Stop Ransomware: Ransomware Attacks on Critical...

This Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and various ransomware threat actors. These #StopRansomware advisories…

Learn More
10 Steps to Prepare For a Ransomware Attack

10 Steps to Prepare For a Ransomware Attack

Continually test your playbook and response plan over time. Invite all staff who will have responsibilities to prevent or respond to attacks: This should include (but is not limited to)…

Learn More
#StopRansomware Guide

#StopRansomware Guide

Malicious actors may exfiltrate data and threaten to release it as their sole form of extortion without employing ransomware. These ransomware and associated data breach incidents can severely impact business…

Learn More
#StopRansomware Guide

#StopRansomware Guide

Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange…

Learn More
10 Steps You Should Have In Place to Recovery Quickly From a Disaster, Ransomware or Cyber Attack

10 Steps You Should Have In Place to Recovery...

Disaster Recovery is a term that gives those responsible for IT sleepless nights, and no wonder. Restoring critical systems, applications, and data that have been corrupted or taken hostage in…

Learn More
MS-ISAC Cybersecurity Enhancement and Incident Response

MS-ISAC Cybersecurity Enhancement and Incident...

This report is intended to aid members of State, Local, Tribal, and Territorial (SLTT) entities in effectively implementing an incident response plan, serving as a resource for enhancing their cybersecurity…

Learn More
6 Reasons You Need Backup for M365

6 Reasons You Need Backup for M365

Microsoft 365 has had a rapidly increasing adoption rate with 1 in 5* employees using the cloud based SaaS platform worldwide. According to IDC research, 6 out of 10 businesses…

Learn More
Securing Government Mobile Devices: Defending Against SMS Phishing with Zimperium Mobile Threat Defense

Securing Government Mobile Devices: Defending...

Explore the critical importance of defending against sophisticated smishing attacks targeting government personnel in this whitepaper. As mobile devices become prime targets, traditional security measures fall short. Discover how Zimperium…

Learn More
Global Threat Intelligence Report

Global Threat Intelligence Report

In this Global Threat Intelligence Report, Mimecast aims to put the previous three months’ worth of incidents into context and give companies the tools they need to understand where attackers…

Learn More
Third Party Breach Report

Third Party Breach Report

This year’s report is all about changes. “The only thing that never changes is that everything changes.” said Louis L’Amour, the American novelist. Another way of expressing that sentiment is,…

Learn More
How to Protect against Iranian Targeting of Accounts Associated with National Political Organizations

How to Protect against Iranian Targeting of...

The Cybersecurity and Infrastructure Security Agency and the FBI are warning of cyber threats from actors linked to Iran’s Islamic Revolutionary Guard Corps. These actors are actively targeting Americans, especially…

Learn More