This study investigated the potential of Generative Pre-trained Transformers (GPTs), a state- of-the-art large language model, in generating cybersecurity policies to deter and mitigate …
F Teichmann - International Cybersecurity Law Review, 2023 - Springer
Ransomware attacks continue to be one of the biggest risks faced by both organizations and governments. In this experimental study, the author tested how criminals could use …
In recent years, ransomware attacks have led to disastrous consequences for victims, not just due to the payment ransom amount but also due to the recovery costs associated with …
Ransomware attacks have evolved with criminals using double extortion schemes, where they signal data exfiltration to inflate ransom demands. This development is further …
Ransomware has risen to be among the top cyber threats in recent years. There is an alarming trend of ransomware stealing data in addition to locking files. Compared to …
In this paper, we analyse how cyber insurance influences the cost–benefit decision-making process of a ransomware victim. Specifically, we ask whether organisations with cyber …
A Alqahtani, FT Sheldon - Sensors, 2024 - mdpi.com
Early detection of ransomware attacks is critical for minimizing the potential damage caused by these malicious attacks. Feature selection plays a significant role in the development of …
In this paper, we consider how the development of targeted ransomware has affected the dynamics of ransomware negotiations to better understand how to respond to ransomware …
Purpose Ransomware is a relatively new form of financial extortion that is proving a major cyber-security threat to individuals and organisations. This study aims to investigate factors …