Ransomware Research Center
Experiencing an Attack?
Why Halcyon
Back to Main
The Halcyon Difference
Our Story
Awards and Recognition
Our Partners
The Halcyon Guarantee
Platform
Back to Main
Halcyon Anti-Ransomware Platform
Platform Overview
How it Works
Key Capabilities
Prevent Ransomware
Stop Data Exfiltration & Extortion
Recover Encrypted Data
Get 24x7 Expert-Led Monitoring
Services
Back to Main
Professional Services
Emergency Ransomware Recovery
Pre-Event Hardening & Assessments
Included Services
24x7 Ransomware Detection & Recovery
Solutions
Back to Main
Halcyon + Tech
Halcyon + Endpoint Detection & Response (EDR)
Halcyon + Backup Solutions
Solutions
By Industry
Education
Energy
Federal
Finance
Government
Healthcare
Manufacturing
Retail
Technology
Telecommunications
Transportation
Resources
Back to Main
Watch
Product Tours
Videos
Webinars
Read
Blog
Customer Stories
Data Sheets
White Papers
Ransomware 101
Research Reports
Connect
Events
All Resources
Ransomware Research Center
Experiencing an Attack?
Get a Demo
Featured Articles
What is Anti-Ransomware?
What is Ransomware-as-a-Service (RaaS)?
What is Resilience in Security?
What Should You Do if Attacked with Ransomware?
Can ransomware infect a USB drive?
FAQ Categories
Cybersecurity Basics
Is Ransomware Malware?
What is Artificial Intelligence (AI) in Security?
What is Machine Learning (ML) in Security?
What is Anti-Ransomware?
What is Cyber Insurance?
What is Double Extortion?
What is the Dark Web?
What is Antivirus (AV)?
What is Endpoint Protection (EPP)?
What is Next Generation Antivirus (NGAV)?
What is Extended Detection and Response (XDR)?
Ransomware Fundamentals
What is Ransomware?
What sort of devices can ransomware infect?
What is a ransomware campaign?
What is Ransomware-as-a-Service (RaaS)?
Why Does Ransomware Exfiltrate Data?
What language in ransomware coded in?
What Does Ransomware Do?
How does ransomware work?
How is Ransomware Delivered?
How does ransomware spread?
How Does Ransomware Infect?
How Do Most Ransomware Attacks Happen?
What is an Encryption Key?
What does ransomware do to an endpoint device?
Ransomware Defense
What is Ransomware Prevention?
What is Resilience in Security?
How Can You Be Resilient Against Ransomware?
Can Ransomware Infect Backups?
Can Ransomware Infect Cloud Storage?
How Do You Mitigate a Ransomware Attack?
How Does Ransomware Bypass Security?
How Does Ransomware Exfiltrate Data?
What File extensions does ransomware leave or change?
Ransomware Recovery
How Do You Recover Files After a Ransomware Attack?
How Do You Recover from a Ransomware Attack?
How Do You Report a Ransomware Attack?
How Can Ransomware Be Removed?
Does Cyber Insurance Cover Ransomware?
How Long Does It Take to Recover from Ransomware?
What to do after a ransomware attack?
What to do if your computer is infected with ransomware?
What is a Ransomware Rollback?
What Should You Do if Attacked with Ransomware?
Assets at Risk
Can ransomware infect a flash drive?
Can ransomware infect a GPU?
Can ransomware infect a network?
Can ransomware infect a USB drive?
Can ransomware infect and encrypt your smartphone?
Can ransomware infect backups?
Can ransomware infect encrypted backups?
Can ransomware infect Google Drive?
Can ransomware infect iCloud?
Can ransomware infect iPads?
Can ransomware infect linux?
Can ransomware infect macOS?
Can ransomware infect mobile devices?
Can ransomware infect nas drive?
Can ransomware infect network drives?
Can ransomware infect onedrive?
Can ransomware infect phones?
Can ransomware infect routers?
Can ransomware infect Sharepoint?
Can ransomware infect Windows?
Ransomware Terminology
What is Air Gapping?
What is AdFind?
What is a Ransomware Affiliate?
What is an Advanced Persistent Threat (APT)?
What is the Advanced Encryption Standard (AES)?
What is an Attack Surface?
What is Backup Destruction?
What is Asymmetric Encryption?
What is Big-Game Hunting?
What is Bitcoin?
What is Anti-Ransomware?
What is Adware?
What is Artificial Intelligence (AI) In Security?
What is Antivirus (AV)?
What is Covenant?
What is a Brute Force Attack?
What is Cobalt Strike?
What is Brute Ratel?
What is a Bootkit?
What is BloodHound?
What is Code Signing Abuse?
What is a CVE?
What is a Buffer Overflow?
What is Command And Control (C2)?
What is an Attack Vector?
What is Botnet?
What is Credential Dumping?
What is a Data Breach?
What is Data Encryption?
What is Data Exfiltration?
What is Cyber Insurance?
What is Cross-Site Scripting (XSS)?
What is CryptoLocker?
What is Credential Harvesting?
What is the Cyber Kill Chain?
What is Crypto Ransomware?
What is Cryptocurrency?
What is Credential Stuffing?
What is Decryption?
What is Data Loss Prevention (DLP)?
What is Defense Evasion?
What is a Data Leak Site?
What is a Distributed Denial Of Service Attack?
What is DCShadow?
What is DCSync?
What is Dwell Time In Cybersecurity?
What is DLL Sideloading?
What is Double Extortion?
What is a Dropper?
What is a Drive-By Download?
What is DLL Injection?
What is DNS Tunneling?
What is a Domain Generation Algorithm (DGA)?
What is an Exploit In Cybersecurity?
What is EternalBlue?
What is Endpoint Detection And Response (EDR)?
What is an Exploit Kit?
What is Endpoint Protection (EPP)?
What is Encryption Key?
What is Emotet?
What is Empire?
What is Fileless Malware?
What is Extended Detection And Response (XDR)?
What is Encryption?
What is Endpoint Detection And Response (EDR)?
What is a Golden Ticket Attack?
What is Initial Access?
What is an Insider Threat?
What is an Initial Access Broker (IAB)?
What is Exploitation In The Context Of Cybersecurity?
What is a Honeypot?
What is Immutability?
What is IcedID?
What is an Immutable Backup?
What is Incident Response?
What is an Indicator Of Compromise?
What are LOLBins?
What is a Loader?
What is Machine Learning?
What is Locker Ransomware?
What is LSASS?
What is a Keylogger?
What is a Logic Bomb?
What are Intrusion Detection And Prevention Systems (IDS/IPS)?
What is Lateral Movement?
What is 'Living Off The Land'?
What is Kerberoasting?
What is LockerGoga?
What is Malspam?
What is MITRE ATT&CK?
What is Managed Detection And Response (MDR)?
What is Managed Security Service Provider (MSSP)?
What is a Man-In-The-Middle (MITM) Attack?
What is Malware?
What is a Malicious Macro?
What is Managed Detection And Response (MDR)?
What is Mimikatz?
What is Metasploit?
What is Multi-Factor Authentication (MFA)?
What is Pass-The-Ticket?
Next
1 / 2
FAQ List
FAQs
Ransomware Fundamentals
Ransomware Fundamentals
What is Ransomware?
Read
What sort of devices can ransomware infect?
Read
What is a ransomware campaign?
Read
What is Ransomware-as-a-Service (RaaS)?
Read
Why Does Ransomware Exfiltrate Data?
Read
What language in ransomware coded in?
Read
What Does Ransomware Do?
Read
How does ransomware work?
Read
How is Ransomware Delivered?
Read
How does ransomware spread?
Read
How Does Ransomware Infect?
Read
How Do Most Ransomware Attacks Happen?
Read
What is an Encryption Key?
Read
What does ransomware do to an endpoint device?
Read