Blog
Stay informed about the latest ransomware threats, security best practices, and product updates.
Why Qilin and Akira Are Reshaping Ransomware Defense in 2026
Ransomware group names change. The business model does not. In 2026, groups like Qilin and Akira show how ransomware operations continue to outpace traditional defenses, where encryption is no longer the first step but the final stage of the attack.
When There Is No Key: What the Stryker Wiper Attack Signals for Security Leaders in 2026
Three weeks. That is how long it reportedly took for medtech manufacturer Stryker to restore operations after a destructive cyberattack that wiped systems across parts of its environment. This wasn't ransomware—there was no key to recover, no ransom demand, no negotiation. This was a wiper attack designed to destroy, not extort.
Strengthening Ransomware Defense: SecuritySnares Partners with Pondurance to Stop Attacks Earlier
SecuritySnares and Pondurance partner to stop ransomware before encryption and data exfiltration, adding prevention to MDR security operations.
Expanding Ransomware Prevention for the Public Sector: SecuritySnares Partners with Carahsoft
SecuritySnares has partnered with Carahsoft to bring a new standard of ransomware prevention to the Public Sector, making RansomSnare available through trusted government contract vehicles.
Defender Spotlight Tyler Hudak
In this series, we highlight security professionals and their work behind the scenes. Questions are based on their experiences over their careers, not necessarily reflective of their current employer.
Defender Spotlight Andy Jackman
In this series, we highlight security professionals and their work behind the scenes. Responses and opinions are based on their experiences over their careers, not necessarily reflective of their curr...
Defender Spotlight Aaron Shelmire
* Aaron * : There’s a few!
Defending Against Ransomware and Wipers with the Purdue Model for OT Networks
In recent years, the proliferation of ransomware and wipers has posed significant threats to operational technology (OT) networks across various industries. These malicious attacks can disrupt critica...
Understanding Akira: A Persistent Ransomware Threat
In the ever-evolving landscape of cybersecurity, staying informed about emerging threats is crucial for organizations to protect their digital assets. One such threat that has garnered attention is th...
Volt Typhoon A multi year Chinese Cyber Assault on Critical Infrastructure
In a very public fashion, FBI Director Christopher Wray recently discussed the extent of China’s ongoing hacking campaign, known as Volt Typhoon. The campaign, as reported by Reuters on April 18th, 20...