Blog

What is file monitoring?

File monitoring is an internal audit process of automatically observing and recording important aspects regarding how files are being accessed…

August 21, 2023

Ransomware detection – Targeted vs. random attacks

When it comes to ransomware detection, targeted ransomware attacks are very difficult to identify through classic anti-virus technology. Although such…

August 21, 2023

Ranstop protects against PowerShell ransomware – TEMASOFT Lab Demo

Test subject – PowerShell ransomware This PowerShell ransomware variant is particularly dangerous because it bypasses conventional anti-malware tools and renders…

August 21, 2023

Ranstop protects against Oxar ransomware, a HiddenTear variant – TEMASOFT Lab Demo

Test subject – Oxar, a HiddenTear variant Oxar is a HiddenTear variant with a highly destructive potential. It features anti-debugging…

August 21, 2023

How can anti-ransomware software support your disaster recovery plan?

Anti-ransomware software supports your disaster recovery plan and protects files and backups and so it is a great addition to…

August 21, 2023

Ransomware protection: why are dedicated anti-ransomware products better than classic antivirus solutions?

Lately, there is a lot of disagreement related to why people who have various types of antivirus solutions in place,…

August 21, 2023

New variant of Petya ransomware attacks computers worldwide

Less than two months ago, WannaCry made the headlines as the most destructive malware in the history. This time the…

August 21, 2023

Ranstop protects against Sorebrect fileless ransomware – TEMASOFT Lab Demo

Sorebrect case subject – fileless ransomware This variant arrives as a text file with a name that tricks the users into…

August 21, 2023

How to detect data breaches

Most people do not know where all their important files are, and this makes detecting data breaches tad difficult. To…

August 21, 2023