Ransomware: Recent advances, analysis, challenges and future research directions

C Beaman, A Barkworth, TD Akande, S Hakak… - Computers & …, 2021 - Elsevier
The COVID-19 pandemic has witnessed a huge surge in the number of ransomware attacks.
Different institutions such as healthcare, financial, and government have been targeted …

A survey on ransomware: Evolution, taxonomy, and defense solutions

H Oz, A Aris, A Levi, AS Uluagac - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …

A framework for cyber-risk insurance against ransomware: A mixed-method approach

A Mukhopadhyay, S Jain - International Journal of Information Management, 2024 - Elsevier
Hackers follow a standard cyber kill chain process and install ransomware payloads using
phishing emails on firms belonging to critical industry, resulting in huge losses in revenue …

Enhancing cybersecurity protocols in modern healthcare systems: Strategies and best practices

MU Tariq - Transformative approaches to patient literacy and …, 2024 - igi-global.com
This chapter explores the crucial responsibility of strengthening cybersecurity measures
within the ever-changing context of contemporary healthcare systems. As digitalization gets …

A survey on windows-based ransomware taxonomy and detection mechanisms

R Moussaileb, N Cuppens, JL Lanet… - ACM Computing Surveys …, 2021 - dl.acm.org
Ransomware remains an alarming threat in the 21st century. It has evolved from being a
simple scare tactic into a complex malware capable of evasion. Formerly, end-users were …

Your files have been encrypted: A crime script analysis of ransomware attacks

SR Matthijsse, MS van 't Hoff-de Goede… - Trends in Organized …, 2023 - Springer
Ransomware attacks have increased in recent years and the impact on victims and society
can be considerable. In order to develop effective measures against ransomware, it is …

[CARTE][B] New dimensions of information warfare

R Di Pietro, S Raponi, M Caprolu, S Cresci, R Di Pietro… - 2021 - Springer
Since the dawn of Humanity, the progress machine tirelessly introduced tools and resources
that facilitated our everyday tasks. Over the years, new technologies have continually …

Nhs wannacry ransomware attack: Technical explanation of the vulnerability, exploitation, and countermeasures

M Aljaidi, A Alsarhan, G Samara… - … on Electrical, Energy …, 2022 - ieeexplore.ieee.org
To ascertain the consequences of the 2017 WannaCry ransomware attack on the National
Health Service (NHS), a systematic investigation of Hospital Episodes Statistics (HES) data …

Here comes the AI worm: Unleashing zero-click worms that target GenAI-powered applications

S Cohen, R Bitton, B Nassi - arxiv preprint arxiv:2403.02817, 2024 - arxiv.org
In the past year, numerous companies have incorporated Generative AI (GenAI) capabilities
into new and existing applications, forming interconnected Generative AI (GenAI) …

Ransomware anti-analysis and evasion techniques: A survey and research directions

MN Olaimat, MA Maarof… - 2021 3rd international …, 2021 - ieeexplore.ieee.org
Ransomware has been proven to constitute a severe threat to the world's digital assets.
Resources or devices' recovery from a Crypto-Ransomware infection is practically infeasible …