Ransomware Research Center
Experiencing an Attack?
Why Halcyon
Back to Main
The Halcyon Difference
Our Story
Awards and Recognition
Our Partners
The Halcyon Guarantee
Platform
Back to Main
Halcyon Anti-Ransomware Platform
Platform Overview
How it Works
Key Capabilities
Prevent Ransomware
Stop Data Exfiltration & Extortion
Recover Encrypted Data
Get 24x7 Expert-Led Monitoring
Services
Back to Main
Professional Services
Emergency Ransomware Recovery
Pre-Event Hardening & Assessments
Included Services
24x7 Ransomware Detection & Recovery
Solutions
Back to Main
Halcyon + Tech
Halcyon + Endpoint Detection & Response (EDR)
Halcyon + Backup Solutions
Solutions
By Industry
Education
Energy
Federal
Finance
Government
Healthcare
Manufacturing
Retail
Technology
Telecommunications
Transportation
Resources
Back to Main
Watch
Product Tours
Videos
Webinars
Read
Blog
Customer Stories
Data Sheets
White Papers
Ransomware 101
Research Reports
Connect
Events
All Resources
Ransomware Research Center
Experiencing an Attack?
Get a Demo
Featured Articles
What is Anti-Ransomware?
What is Ransomware-as-a-Service (RaaS)?
What is Resilience in Security?
What Should You Do if Attacked with Ransomware?
Can ransomware infect a USB drive?
FAQ Categories
Cybersecurity Basics
Is Ransomware Malware?
What is Artificial Intelligence (AI) in Security?
What is Machine Learning (ML) in Security?
What is Anti-Ransomware?
What is Cyber Insurance?
What is Double Extortion?
What is the Dark Web?
What is Antivirus (AV)?
What is Endpoint Protection (EPP)?
What is Next Generation Antivirus (NGAV)?
What is Extended Detection and Response (XDR)?
Ransomware Fundamentals
What is Ransomware?
What sort of devices can ransomware infect?
What is a ransomware campaign?
What is Ransomware-as-a-Service (RaaS)?
Why Does Ransomware Exfiltrate Data?
What language in ransomware coded in?
What Does Ransomware Do?
How does ransomware work?
How is Ransomware Delivered?
How does ransomware spread?
How Does Ransomware Infect?
How Do Most Ransomware Attacks Happen?
What is an Encryption Key?
What does ransomware do to an endpoint device?
Ransomware Defense
What is Ransomware Prevention?
What is Resilience in Security?
How Can You Be Resilient Against Ransomware?
Can Ransomware Infect Backups?
Can Ransomware Infect Cloud Storage?
How Do You Mitigate a Ransomware Attack?
How Does Ransomware Bypass Security?
How Does Ransomware Exfiltrate Data?
What File extensions does ransomware leave or change?
Ransomware Recovery
How Do You Recover Files After a Ransomware Attack?
How Do You Recover from a Ransomware Attack?
How Do You Report a Ransomware Attack?
How Can Ransomware Be Removed?
Does Cyber Insurance Cover Ransomware?
How Long Does It Take to Recover from Ransomware?
What to do after a ransomware attack?
What to do if your computer is infected with ransomware?
What is a Ransomware Rollback?
What Should You Do if Attacked with Ransomware?
Assets at Risk
Can ransomware infect a flash drive?
Can ransomware infect a GPU?
Can ransomware infect a network?
Can ransomware infect a USB drive?
Can ransomware infect and encrypt your smartphone?
Can ransomware infect backups?
Can ransomware infect encrypted backups?
Can ransomware infect Google Drive?
Can ransomware infect iCloud?
Can ransomware infect iPads?
Can ransomware infect linux?
Can ransomware infect macOS?
Can ransomware infect mobile devices?
Can ransomware infect nas drive?
Can ransomware infect network drives?
Can ransomware infect onedrive?
Can ransomware infect phones?
Can ransomware infect routers?
Can ransomware infect Sharepoint?
Can ransomware infect Windows?
Ransomware Terminology
What is Playbook/Runbook?
What is Pass-The-Hash?
What is Phishing?
What is Obfuscation?
What is Persistence In Cybersecurity?
What is Pivoting In Cyberattacks?
What is Network Segmentation?
What is Polymorphic Malware?
What is Privilege Escalation?
What is Process Injection?
What is the Principle Of Least Privilege?
What is Next Generation Antivirus (NGAV)?
What is Ransomware Gang?
What is Process Hollowing?
What is Pysa?
What is PowerShell Empire?
What is Resilience?
What is RSA Encryption?
What is Rivest–Shamir–Adleman (RSA)?
What is a Reverse Shell?
What is Reconnaissance In Cybersecurity?
What is a Remote Access Trojan (RAT)?
What is Remote Code Execution (RCE)?
What is Ransomware Campaign?
What is PsExec?
What is Scareware?
What is Spear Phishing?
What is Shellcode?
What is SQL Injection?
What is Social Engineering?
What is Spyware?
What is Security Bypass In Cybersecurity?
What is SOC/SOCaaS?
What is Service Level Agreement (SLA)?
What is Tabletop Exercise?
What is Threat Hunting?
What is Triple Extortion?
What is a Trojan Horse?
What is Symmetric Encryption?
What is a User Account Control (UAC) Bypass?
What is a Supply Chain Attack?
What is Time-To-Ransom?
What is Remote Desktop Protocol (RDP)?
What is a Watering Hole Attack?
What is a Web Shell?
What is a Zero-Day Vulnerability?
What is a Wiper Malware?
What is Volume Shadow Copy?
Previous
2 / 2
FAQ List
FAQs
Ransomware Fundamentals
Ransomware Fundamentals
What is Ransomware?
Read
What sort of devices can ransomware infect?
Read
What is a ransomware campaign?
Read
What is Ransomware-as-a-Service (RaaS)?
Read
Why Does Ransomware Exfiltrate Data?
Read
What language in ransomware coded in?
Read
What Does Ransomware Do?
Read
How does ransomware work?
Read
How is Ransomware Delivered?
Read
How does ransomware spread?
Read
How Does Ransomware Infect?
Read
How Do Most Ransomware Attacks Happen?
Read
What is an Encryption Key?
Read
What does ransomware do to an endpoint device?
Read