![Ransomware Attacks](https://www.lepide.com/blog/wp-content/uploads/2023/12/backup-small.jpg)
It’s no secret that ransomware attacks can cause significant damage, and while it is essential… Read More
![Philip Robinson](https://www.lepide.com/blog/wp-content/uploads/2022/02/Me.jpg)
![Double Extortion Ransomware](https://www.lepide.com/blog/wp-content/uploads/2023/11/double-extortion-small.jpg)
Over time, ransomware attacks have become more advanced, spreading through various methods such as phishing… Read More
![Philip Robinson](https://www.lepide.com/blog/wp-content/uploads/2022/02/Me.jpg)
![Rorschach Ransomware](https://www.lepide.com/blog/wp-content/uploads/2023/07/rorschach-small.jpg)
What is Rorschach Ransomware? Earlier this year (2023), researchers discovered a new ransomware strain called… Read More
![Sharon Marusich](https://www.lepide.com/blog/wp-content/uploads/2022/02/Sharon.jpg)
![Industrial Control Systems](https://www.lepide.com/blog/wp-content/uploads/2023/06/ics-small.jpg)
Industrial control systems (ICS) are computer-based systems that monitor and control industrial processes, such as… Read More
![Sharon Marusich](https://www.lepide.com/blog/wp-content/uploads/2022/02/Sharon.jpg)
![Ransomware Attack Vectors](https://www.lepide.com/blog/wp-content/uploads/2023/06/ransomware-vectors-small.jpg)
With the rise of digital transformation, the prevalence of ransomware attacks has come to the… Read More
![Sarah Marshall](https://www.lepide.com/blog/wp-content/uploads/2023/05/Sarah-Marshall-1.jpg)
![CACTUS Ransomware](https://www.lepide.com/blog/wp-content/uploads/2023/06/cactus-small.jpg)
What is CACTUS Ransomware Cyber threat intelligence analysts at Kroll, a provider of financial advisory… Read More
![Anna Szentgyorgyi-Siklosi](https://www.lepide.com/blog/wp-content/uploads/2022/11/anna-photo-150x150.jpg)