• May 27 2022

    Data Security: Protecting the Crown Jewels

    Data security is one of the most important concerns for any organization to ensure customer data, trade secrets and commercial data doesn’t fall into the wrong hands.

  • May 16 2022

    Industrial Spy: Selling Stolen Data to Competitors

    Industrial Spy is a new way of selling stolen data of victims to competitors. Companies can buy their competitors’ trade secrets for millions of dollars – or as little as $2.

  • May 9 2022

    Beyond the Ransom: The True Cost of Ransomware Attacks

    The True Cost of Ransomware Attacks highlights the downtime costs, reputational damage and the cost of new security implementations when trying to recover from a ransomware attack.

  • March 7 2022

    The New Insider Threat: Are ransomware groups recruiting your employees?

    Ransomware groups are using increasingly sophisticated technology and infrastructure to carry out attacks while adopting new tactics to pressurize their victims such as recruiting your employees.

  • February 22 2022

    Ransomware Group Tactics in 2022

  • February 15 2022

    Ransomware as a Service: Industrialized Cybercrime is the New Normal

    Industrialized cybercrime, critical infrastructure attacks and sky-high ransoms are just the beginning of ransomware as a service business models.

  • January 13 2022

    2021 Ransomware Attack Report

    In 2020 and 2021 BlackFog measured publicly disclosed attacks globally. The 2021 ransomware attack report summarizes these findings and highlights the key trends as we enter 2022.

  • January 4 2022

    The State of Ransomware in 2021

    Following on from our State of Ransomware 2020 blog, we’ll be tracking the 2021 publicized ransomware attacks each month to share with you via this blog.  This year we expect the number of attacks to increase and newer forms to become more sophisticated and disruptive.

  • June 22 2021

    Anonymous Ransomware Attack Tools

  • May 18 2021

    The Shift from Ransomware to Data Theft Extortion

    With data theft extortion, instead of a single ransom demand, there may be hundreds or thousands. In most cases, cybercriminals are adopting a dual-revenue model where a single, large-scale ransom demand is accompanied by individual ransoms for affected parties.

  • May 10 2021

    Top 5 Ransomware Myths

    In this blog we’ll look at some of the ransomware myths and how data exfiltration prevention can facilitate compliance and mitigate risks associated with an attack.

  • February 15 2021

    Ransomware Breaches and Class Action Lawsuits

    While some organizations are waking up to the fact the ransomware attacks are in fact data breaches, unless perhaps data exfiltration technology can prove otherwise, many are still opting to sweep the attack under the carpet.