Ransomware and Costa Rica's national emergency: A defense framework and teaching case

PM Datta, T Acton - Journal of Information Technology …, 2024 - journals.sagepub.com
This teaching case describes the 2022 Costa Rican ransomware attack national emergency—
presenting stakeholder perspectives of perpetrator and prey along with a proactive …

How does one negotiate with ransomware attackers?

S Boticiu, F Teichmann - International Cybersecurity Law Review, 2024 - Springer
Ransomware attacks are a serious and growing threat based on a cybercrime business
model exploiting the lack of security in many organizations. The criminal groups behind …

'There was a bit of PTSD every time I walked through the office door': Ransomware harms and the factors that influence the victim organization's experience

G Mott, S Turner, JRC Nurse, N Pattnaik… - Journal of …, 2024 - academic.oup.com
Ransomware is a pernicious contemporary cyber threat for organizations, with ransomware
operators intentionally leveraging a range of harms against their victims in order to solicit …

Fight Malware Like Malware: A New Defense Method Against Crypto Ransomware

A Yu, J Kang, J Morris, E Bertino… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Ransomware attacks have become widespread in the last few years and have affected
many critical industries and infrastructures. Unfortunately, there are no recovery tools that …

An Empirical Study of Data Disruption by Ransomware Attacks

Y Hou, L Guo, C Zhou, Y Xu, Z Yin, S Li, C Sun… - Proceedings of the …, 2024 - dl.acm.org
The threat of ransomware to the software ecosystem has become increasingly alarming in
recent years, raising a demand for large-scale and comprehensive ransomware analysis to …

All Your LLMs Belong to Us: Experiments with a New Extortion Phishing Dataset

FZ Qachfar, RM Verma - IFIP Annual Conference on Data and Applications …, 2024 - Springer
In the last decade, there has been a dramatic rise in phishing emails including business
email compromise, and extortion attacks. Ransomware and blackmail are examples of …

A big data approach to risk management and control: Cybersecurity in accounting

P Halachev - Periodicals of Engineering and Natural Sciences …, 2024 - pen.ius.edu.ba
This research reviews into the critical interplay between big data applications and
cybersecurity risks within the accounting sector. Aimed at understanding how big data can …

A SURVEY OF THE CURRENT AND EMERGING RANSOMWARE THREAT LANDSCAPE

JLJ Worrell - EDPACS, 2024 - Taylor & Francis
Ransomware attacks have become more prevalent, sophisticated, and organized.
Ransomware is a catch-all term associated with revenue-generating malicious software that …

Cybersecurity Policies Implementation: A Theoretical Model Based on Process Thinking Perspective

M Kour, J Pierce - Strengthening Industrial Cybersecurity to Protect …, 2024 - igi-global.com
In today's digital age, the Internet is a platform upon which several aspects of social and
business interactions are made. In the business sense, organisations use the Internet to …

The Economics of Information Security: Investment, Insurance and Evaluation

HRK Skeoch - 2024 - discovery.ucl.ac.uk
The complexity and connectivity of modern information technology systems present a
significant modelling challenge from a security perspective. The field of security economics …