How to detect data breaches

August 21, 2023

Most people do not know where all their important files are, and this makes detecting data breaches tad difficult. To…

How to protect against ransomware

August 21, 2023

Ransomware is an important phenomenon nowadays and dealing with it is a top concern of IT admins. This type of…

How to recover from ransomware attacks

August 21, 2023

This article provides information on what to do when attacked by ransomware, depending on how important the files are and…

Ranstop offers protection against ransomware embedded in PDF files – TEMASOFT Lab Demo

August 21, 2023

Case subject – A new PDF based ransomware This new variant arrives as a PDF file that contains Javascript blocks…

Ranstop stops zero-day Jaff variant – TEMASOFT Lab Demo

August 21, 2023

Case subject – A zero-day Jaff (WLU extension) Jaff ransomware has seen some updates lately and we selected the newest…

Ranstop stops zero-day, script-based Spora variant – TEMASOFT Lab Demo

August 21, 2023

Case subject – A zero-day Spora variant packed as a command line script Today's test uses a zero-day variant of…

Ranstop anti-ransomware stops WannaCryptor v2 – TEMASOFT Lab Demo

August 21, 2023

Case subject: WannaCryptor(WannaCry) v2 - (Virustotal details) Following up on the massive WannaCrypt attack, we have tested TEMASOFT Ranstop against…

Wanna Cry ransomware reveals the limits of the current security systems

August 21, 2023

The world is in shock after the most damaging ransomware attack in history, and many people ask how this is possible…

What is ransomware, and why is it so damaging for businesses?

August 21, 2023

Ransomware is a type of malware that aims to extort money from companies by disrupting their activities. The most widespread type of…

28 Years of Cyber Extortion: From Floppy Disk to Cloud

August 21, 2023

Cyber extortion has been around for nearly three decades, and the general feeling you get when reading the news nowadays…