Tag

Ransomware

Explore how ransomware attacks work, how they infiltrate networks, and what steps individuals and organizations can take to prevent, detect, and recover from ransomware incidents. Articles cover recent ransomware variants, encryption tactics, backup strategies, and incident response planning.

posts

Data Breach

What Causes a Data Breach: 7 Real Threats in 2021

In July 2020, Twitter disclosed that attackers had compromised 130 high-profile accounts — including those of Barack Obama, Elon Musk, and Apple — through a social engineering attack targeting employees with access to internal tools. The breach didn't involve some exotic zero-day exploit. It started with phone calls to Twitter

Carl B. Johnson Jan 20, 2021 7 min read
Incident Response

How to Respond to a Cyberattack: A Practical Guide

In July 2020, Garmin went dark. Their fitness trackers, aviation navigation tools, and customer support systems all went offline simultaneously. A ransomware attack attributed to the WastedLocker strain reportedly crippled the company for days. If you're wondering how to respond to a cyberattack, Garmin's very public

Carl B. Johnson Dec 20, 2020 7 min read
Cloud Storage Security Risks

Cloud Storage Security Risks Your Team Is Ignoring

The Misconfigured Bucket That Exposed 540 Million Records In 2019, researchers at UpGuard discovered that Facebook app developers had stored hundreds of millions of user records in Amazon S3 buckets with public access enabled. No hacking. No zero-day exploit. Just a misconfiguration checkbox that nobody reviewed. That single oversight sits

Carl B. Johnson Oct 27, 2020 7 min read
Supply Chain Attacks

Supply Chain Attack Examples That Changed Cybersecurity

In December 2020, security firm FireEye discovered that a routine software update from SolarWinds had been weaponized to infiltrate roughly 18,000 organizations — including the U.S. Treasury, the Department of Homeland Security, and multiple Fortune 500 companies. The attackers didn't kick down the front door. They walked

Carl B. Johnson Sep 07, 2020 7 min read
Cybersecurity Terms Explained

Cybersecurity Terms Explained: A Practical Guide

When the Colonial Pipeline attack shut down fuel distribution across the Eastern United States in 2021, news anchors stumbled over words like "ransomware," "threat actor," and "zero trust." Millions of people realized they didn't speak the language of cybersecurity — and that ignorance

Carl B. Johnson May 08, 2020 7 min read
Malware

What Is Malware? A Security Pro's Real-World Guide

The Attack That Shut Down 100 Romanian Hospitals In February 2024, a ransomware attack hit over 100 hospitals across Romania, forcing them offline and back to pen-and-paper operations. Patient data was encrypted. Emergency services were disrupted. The attack vector? Malware that slipped through a single vulnerable system and spread laterally

Carl B. Johnson May 08, 2020 7 min read
Types of Malware

Types of Malware: What Actually Hits Networks in 2026

A Single Click Cost One Hospital Chain $100 Million In 2024, Change Healthcare was hit by the ALPHV/BlackCat ransomware group. The attack disrupted insurance claims processing for thousands of healthcare providers across the United States. UnitedHealth Group eventually disclosed costs exceeding $870 million related to the incident. The entry

Carl B. Johnson May 08, 2020 7 min read
Ransomware

What Is Ransomware? A Practical Defense Guide for 2026

In May 2021, Colonial Pipeline paid a $4.4 million ransom to the DarkSide threat actor group after a single compromised password shut down fuel distribution across the U.S. East Coast. Gas stations ran dry. Panic buying erupted. And one of the most critical infrastructure networks in the country

Carl B. Johnson Nov 30, 2019 7 min read
Ransomware Recovery

Ransomware Recovery Steps: A Battle-Tested Playbook

The Attack That Paralyzed a Hospital System for 28 Days In 2024, Ascension Healthcare — one of the largest health systems in the United States — was hit by the Black Basta ransomware group. The attack disrupted operations across 140 hospitals. Clinicians reverted to paper records. Ambulances were diverted. It took nearly

Carl B. Johnson Nov 30, 2019 7 min read