BlackFog Logo
Ransomware and Cybersecurity Blog2025-10-20T09:26:01+01:00

Ransomware and Cybersecurity Blog

The Johnson Controls Ransomware Attack – Impact and Key Insights Review

By |December 19th, 2024|

In September 2023, Johnson Controls International suffered a ransomware attack linked to the Dark Angels group, resulting in the theft of 27TB of sensitive data. The breach caused $27 million in losses and disrupted operations, highlighting the critical need for robust cybersecurity defenses.

The 2024 Vulnerability Crisis – Managing Cybersecurity Threats

By |December 16th, 2024|

Learn how organizations can meet the onslaught of cybersecurity vulnerabilities, along with five of the most common vulnerabilities and successful management strategies. Find out why there’s a new vulnerability every 17 minutes.

The Cybersecurity Implications of Remote vs Office Work

By |December 6th, 2024|

Explore the cybersecurity challenges and benefits of remote work versus office environments. From network vulnerabilities to social engineering risks, learn how to secure your workforce, whether they’re working from home or the office.

Ransomware Containment: Effective Strategies to Protect Your Business

By |November 29th, 2024|

Discover effective ransomware containment strategies for your business. This guide discusses network segmentation, zero trust, and practical best practices for IT managers and cybersecurity professionals to reduce ransomware damage.

Ransomware Meets Retail: Sainsbury’s, Starbucks and Morrisons Feel the Heat from Blue Yonder Attack

By |November 27th, 2024|

The Blue Yonder ransomware attack disrupted major retailers like Sainsbury’s, Starbucks, and Morrisons, highlighting the vulnerabilities of global supply chains and the urgent need for stronger cybersecurity defenses.

Everything That You Need to Know About the Dark Web and Cybercrime

By |November 18th, 2024|

Learn about the dark web, including who uses it, how it operates, and what tools cybercriminals obtain on it. Find out how BlackFog monitors networks, forums, and ransomware leak sites in order to stay ahead of new threats.