Books & Videos

Table of Contents

  1. Understanding Ransomware

    1. Chapter 1 Introduction to Ransomware

      1. Ransomware’s Checkered Past
      2. Anatomy of a Ransomware Attack
      3. Destruction Phase
      4. The Rapid Growth of Ransomware
      5. Summary
    2. Chapter 2 Pros and Cons of Paying the Ransom

      1. “Oh”
      2. When to Pay the Ransom
      3. Ransomware and Reporting Requirements
      4. Summary
    3. Chapter 3 Ransomware Operators and Targets

      1. Criminal Organizations
      2. Who Are Ransomware Groups Targeting?
      3. Ransomware as a Service (RaaS)
      4. Summary
  2. Defensive Tactics

    1. Chapter 4 Protecting Workstations and Servers

      1. Attack Vectors for Ransomware
      2. Hardening the System and Restricting Access
      3. Protecting Public-Facing Servers
      4. Alerting and Reacting Quickly
      5. Honeyfiles and Honeydirectories
      6. Summary
    2. Chapter 5 Protecting the Workforce

      1. Knowing the Risks and Targets
      2. Learning How to Prevent Compromises
      3. Testing and Teaching Users
      4. Post Ransomware
      5. Summary
    3. Chapter 6 Threat Intelligence and Ransomware

      1. Understanding the Latest Delivery Methods
      2. Using the Latest Network Indicators
      3. Detecting the Latest Behavioral Indicators
      4. Summary
  3. Ransomware Families

    1. Chapter 7 Cerber

      1. Who Developed Cerber?
      2. The Encryption Process
      3. Protecting Against Cerber
      4. Summary
    2. Chapter 8 Locky

      1. Who Developed Locky?
      2. The Encryption Process
      3. Protecting Against Locky
      4. Summary
    3. Chapter 9 CryptXXX

      1. Who Developed CryptXXX?
      2. The Encryption Process
      3. Protecting Against CryptXXX
      4. Summary
    4. Chapter 10 Other Ransomware Families

      1. CryptoWall
      2. PowerWare
      3. Ransom32
      4. KeRanger/KeyRanger
      5. Hidden Tear
      6. TeslaCrypt
      7. Mobile Ransomware
      8. Ransomware Targeting Medical Devices
      9. Summary