Tag

Ransomware

Explore how ransomware attacks work, how they infiltrate networks, and what steps individuals and organizations can take to prevent, detect, and recover from ransomware incidents. Articles cover recent ransomware variants, encryption tactics, backup strategies, and incident response planning.

posts

Ransomware Examples 2026

Ransomware Examples 2026: Real Attacks Hitting Now

A single phishing email brought down a regional hospital chain's entire electronic health records system for eleven days in January. The attackers demanded $14 million in cryptocurrency. The hospital paid. That's where we are right now — and if you're searching for ransomware examples 2026,

Carl B. Johnson Nov 30, 2019 7 min read
Ransomware

How Ransomware Spreads: 7 Paths Into Your Network

In May 2021, a single compromised VPN password shut down the largest fuel pipeline in the United States. The Colonial Pipeline attack didn't start with some exotic zero-day exploit. It started with a stolen credential. That's the reality of how ransomware spreads — and it's

Carl B. Johnson Nov 30, 2019 6 min read
Data Breach Examples

Data Breach Examples 2026: Lessons from This Year

2026 Has Already Been Brutal for Data Security We're barely halfway through the year, and the data breach examples from 2026 already paint a grim picture. Healthcare systems, school districts, financial platforms, and major retailers have all made headlines — not for innovation, but for failing to protect customer

Carl B. Johnson Nov 26, 2019 6 min read
Incident Response

How to Respond to a Cyberattack: A Practical Guide

In 2023, MGM Resorts lost an estimated $100 million after a social engineering attack that started with a single phone call to an IT help desk. The threat actor impersonated an employee, convinced a technician to reset credentials, and within hours had deployed ransomware across critical systems. Slot machines went

Carl B. Johnson Oct 09, 2019 7 min read
Cybersecurity Incident Examples

Cybersecurity Incident Examples That Changed Security

A Single Stolen Password Started a $4.4 Billion Problem In May 2021, a single compromised password shut down the Colonial Pipeline — the largest fuel pipeline in the United States. Fuel shortages hit the East Coast. Panic buying emptied gas stations across multiple states. The company paid a $4.4

Carl B. Johnson Oct 09, 2019 7 min read
Cyber Incident Reporting

How to Report a Cyber Incident: A Step-by-Step Guide

The Breach That Nobody Reported — Until It Was Too Late In 2023, a mid-size healthcare provider in the Midwest discovered suspicious network activity on a Friday afternoon. The IT manager flagged it internally but didn't report it externally. By Monday morning, threat actors had exfiltrated 1.4 million

Carl B. Johnson Oct 01, 2019 6 min read
Cybersecurity for Law Firms

Cybersecurity for Law Firms: A Practical Defense Guide

Why Threat Actors Treat Law Firms Like ATMs In 2023, the international law firm Bryan Cave Leighton Paisner disclosed a breach that exposed the personal data of over 51,000 individuals — including clients of major corporations like Mondelēz. That same year, an Am Law 100 firm paid a multimillion-dollar ransom

Carl B. Johnson Sep 10, 2019 7 min read
Supply Chain Attack Examples

Supply Chain Attack Examples That Changed Cybersecurity

In December 2020, security firm FireEye disclosed that threat actors had compromised SolarWinds' Orion software platform — and with it, roughly 18,000 organizations that installed a poisoned update. Government agencies, Fortune 500 companies, and critical infrastructure operators all got hit through a single trusted vendor. That's the

Carl B. Johnson Aug 14, 2019 6 min read
Cybersecurity Terms Explained

Cybersecurity Terms Explained: A Practical Guide

During a breach investigation last year, I watched a CFO stare blankly at an incident responder who kept saying "the threat actor used credential stuffing to pivot laterally after compromising an MFA-gapped endpoint." The CFO's response: "Can someone please speak English?" That moment cost

Carl B. Johnson Jul 20, 2019 7 min read