Ransomware, extortion, and intrusion defense
Learn how to better protect your organization from ransomware, extortion, and intrusion
Microsoft's top resources for ransomware defense
Reference
Frequently asked questions about ransomware - How Microsoft can help
Concept
- What are the stages in a ransomware attack?
- How do I detect pre-ransom activities?
- How do I back-up and restore post ransomware attack?
- How do I proactively hunt for ransomware?
- What are common types of malware that are used in ransomware campaigns?
- Can I download a ransomware incident response playbook?
Prevalent ransomware trends
Reference
- Recent Microsoft Security ransomware blog
- Recent Microsoft social media posts about ransomware
- Human-operated ransomware (HumOR) and pre-HumOR attacks
- Automatic disruption of ransomware attacks
- Ransomware threat actor highlight - BlackCat
- Insights on ransomware and extortion - Microsoft Digital Defense Report 2023
Microsoft Blogs about ransomware
Reference
- Moonstone Sleet emerges as new North Korean actor with new bag of tricks - May 2024
- Ransomware as a service. Understanding the cybercrime gig economy and how to protect yourself
- How Microsoft protects against ransomware
- Octo Tempest - A recurring ransomware threat
- Building an anti-ransomware program at Microsoft focused on an Optimal Ransomware Resiliency State