Ransomware Research Center
Experiencing an Attack?
Why Halcyon
Back to Main
The Halcyon Difference
Our Story
Awards and Recognition
Our Customers
Our Partners
The Halcyon Guarantee
Platform
Back to Main
Halcyon Anti-Ransomware Platform
Platform Overview
How it Works
Ransomware Warranty
Key Capabilities
Prevent Ransomware
Stop Data Exfiltration & Extortion
Recover Encrypted Data
Get 24x7 Expert-Led Monitoring
Services
Back to Main
Professional Services
Emergency Ransomware Recovery
Pre-Event Hardening & Assessments
Included Services
24x7 Ransomware Detection & Recovery
Customer Success
Solutions
Back to Main
Halcyon + Tech
Halcyon + Endpoint Detection & Response (EDR)
Halcyon + Backup Solutions
Solutions By Industry
Education
Energy
Federal
Finance
Government
Healthcare
Manufacturing
Retail
Technology
Telecommunications
Transportation
Resources
Back to Main
Watch
Product Tours
Videos
Webinars
Read
Blog
Customer Stories
Data Sheets
Newsroom
Ransomware 101
Research Reports
White Papers
Connect
Events
All Resources
Get a Demo
Ransomware Research Center
Experiencing an Attack?
Get a Demo
Featured Articles
What is Anti-Ransomware?
What is Ransomware-as-a-Service (RaaS)?
What is Resilience in Security?
What Should You Do if Attacked with Ransomware?
Can ransomware infect a USB drive?
FAQ Categories
Cybersecurity Basics
Is Ransomware Malware?
What is Artificial Intelligence (AI) in Security?
What is Machine Learning (ML) in Security?
What is Anti-Ransomware?
What is Cyber Insurance?
What is Double Extortion?
What is the Dark Web?
What is Antivirus (AV)?
What is Endpoint Protection (EPP)?
What is Next Generation Antivirus (NGAV)?
What is Extended Detection and Response (XDR)?
Ransomware Fundamentals
What is Ransomware?
What sort of devices can ransomware infect?
What is a ransomware campaign?
What is Ransomware-as-a-Service (RaaS)?
Why Does Ransomware Exfiltrate Data?
What language in ransomware coded in?
What Does Ransomware Do?
How does ransomware work?
How is Ransomware Delivered?
How does ransomware spread?
How Does Ransomware Infect?
How Do Most Ransomware Attacks Happen?
What is an Encryption Key?
What does ransomware do to an endpoint device?
Ransomware Defense
What is Ransomware Prevention?
What is Resilience in Security?
How Can You Be Resilient Against Ransomware?
Can Ransomware Infect Backups?
Can Ransomware Infect Cloud Storage?
How Do You Mitigate a Ransomware Attack?
How Does Ransomware Bypass Security?
How Does Ransomware Exfiltrate Data?
What File extensions does ransomware leave or change?
Ransomware Recovery
How Do You Recover Files After a Ransomware Attack?
How Do You Recover from a Ransomware Attack?
How Do You Report a Ransomware Attack?
How Can Ransomware Be Removed?
Does Cyber Insurance Cover Ransomware?
How Long Does It Take to Recover from Ransomware?
What to do after a ransomware attack?
What to do if your computer is infected with ransomware?
What is a Ransomware Rollback?
What Should You Do if Attacked with Ransomware?
Assets at Risk
Can ransomware infect a flash drive?
Can ransomware infect a GPU?
Can ransomware infect a network?
Can ransomware infect a USB drive?
Can ransomware infect and encrypt your smartphone?
Can ransomware infect backups?
Can ransomware infect encrypted backups?
Can ransomware infect Google Drive?
Can ransomware infect iCloud?
Can ransomware infect iPads?
Can ransomware infect linux?
Can ransomware infect macOS?
Can ransomware infect mobile devices?
Can ransomware infect nas drive?
Can ransomware infect network drives?
Can ransomware infect onedrive?
Can ransomware infect phones?
Can ransomware infect routers?
Can ransomware infect Sharepoint?
Can ransomware infect Windows?
Ransomware Terminology
What is Air Gapping?
What is AdFind?
What is a Ransomware Affiliate?
What is an Advanced Persistent Threat (APT)?
What is the Advanced Encryption Standard (AES)?
What is an Attack Surface?
What is Backup Destruction?
What is Asymmetric Encryption?
What is Big-Game Hunting?
What is Bitcoin?
What is Anti-Ransomware?
What is Adware?
What is Artificial Intelligence (AI) In Security?
What is Antivirus (AV)?
What is Covenant?
What is a Brute Force Attack?
What is Cobalt Strike?
What is Brute Ratel?
What is a Bootkit?
What is BloodHound?
What is Code Signing Abuse?
What is a CVE?
What is a Buffer Overflow?
What is Command And Control (C2)?
What is an Attack Vector?
What is Botnet?
What is Credential Dumping?
What is a Data Breach?
What is Data Encryption?
What is Data Exfiltration?
What is Cyber Insurance?
What is Cross-Site Scripting (XSS)?
What is CryptoLocker?
What is Credential Harvesting?
What is the Cyber Kill Chain?
What is Crypto Ransomware?
What is Cryptocurrency?
What is Credential Stuffing?
What is Decryption?
What is Data Loss Prevention (DLP)?
What is Defense Evasion?
What is a Data Leak Site?
What is a Distributed Denial Of Service Attack?
What is DCShadow?
What is DCSync?
What is Dwell Time In Cybersecurity?
What is DLL Sideloading?
What is Double Extortion?
What is a Dropper?
What is a Drive-By Download?
What is DLL Injection?
What is DNS Tunneling?
What is a Domain Generation Algorithm (DGA)?
What is an Exploit In Cybersecurity?
What is EternalBlue?
What is Endpoint Detection And Response (EDR)?
What is an Exploit Kit?
What is Endpoint Protection (EPP)?
What is Encryption Key?
What is Emotet?
What is Empire?
What is Fileless Malware?
What is Extended Detection And Response (XDR)?
What is Encryption?
What is Endpoint Detection And Response (EDR)?
What is a Golden Ticket Attack?
What is Initial Access?
What is an Insider Threat?
What is an Initial Access Broker (IAB)?
What is Exploitation In The Context Of Cybersecurity?
What is a Honeypot?
What is Immutability?
What is IcedID?
What is an Immutable Backup?
What is Incident Response?
What is an Indicator Of Compromise?
What are LOLBins?
What is a Loader?
What is Machine Learning?
What is Locker Ransomware?
What is LSASS?
What is a Keylogger?
What is a Logic Bomb?
What are Intrusion Detection And Prevention Systems (IDS/IPS)?
What is Lateral Movement?
What is 'Living Off The Land'?
What is Kerberoasting?
What is LockerGoga?
What is Malspam?
What is MITRE ATT&CK?
What is Managed Detection And Response (MDR)?
What is Managed Security Service Provider (MSSP)?
What is a Man-In-The-Middle (MITM) Attack?
What is Malware?
What is a Malicious Macro?
What is Managed Detection And Response (MDR)?
What is Mimikatz?
What is Metasploit?
What is Multi-Factor Authentication (MFA)?
What is Pass-The-Ticket?
Next
1 / 2
FAQ List
FAQs
Ransomware Terminology
Ransomware Terminology
What is Air Gapping?
Read
What is AdFind?
Read
What is a Ransomware Affiliate?
Read
What is an Advanced Persistent Threat (APT)?
Read
What is the Advanced Encryption Standard (AES)?
Read
What is an Attack Surface?
Read
What is Backup Destruction?
Read
What is Asymmetric Encryption?
Read
What is Big-Game Hunting?
Read
What is Bitcoin?
Read
What is Anti-Ransomware?
Read
What is Adware?
Read
What is Artificial Intelligence (AI) In Security?
Read
What is Antivirus (AV)?
Read
What is Covenant?
Read
What is a Brute Force Attack?
Read
What is Cobalt Strike?
Read
What is Brute Ratel?
Read
What is a Bootkit?
Read
What is BloodHound?
Read
What is Code Signing Abuse?
Read
What is a CVE?
Read
What is a Buffer Overflow?
Read
What is Command And Control (C2)?
Read
What is an Attack Vector?
Read
What is Botnet?
Read
What is Credential Dumping?
Read
What is a Data Breach?
Read
What is Data Encryption?
Read
What is Data Exfiltration?
Read
What is Cyber Insurance?
Read
What is Cross-Site Scripting (XSS)?
Read
What is CryptoLocker?
Read
What is Credential Harvesting?
Read
What is the Cyber Kill Chain?
Read
What is Crypto Ransomware?
Read
What is Cryptocurrency?
Read
What is Credential Stuffing?
Read
What is Decryption?
Read
What is Data Loss Prevention (DLP)?
Read
What is Defense Evasion?
Read
What is a Data Leak Site?
Read
What is a Distributed Denial Of Service Attack?
Read
What is DCShadow?
Read
What is DCSync?
Read
What is Dwell Time In Cybersecurity?
Read
What is DLL Sideloading?
Read
What is Double Extortion?
Read
What is a Dropper?
Read
What is a Drive-By Download?
Read
What is DLL Injection?
Read
What is DNS Tunneling?
Read
What is a Domain Generation Algorithm (DGA)?
Read
What is an Exploit In Cybersecurity?
Read
What is EternalBlue?
Read
What is Endpoint Detection And Response (EDR)?
Read
What is an Exploit Kit?
Read
What is Endpoint Protection (EPP)?
Read
What is Encryption Key?
Read
What is Emotet?
Read
What is Empire?
Read
What is Fileless Malware?
Read
What is Extended Detection And Response (XDR)?
Read
What is Encryption?
Read
What is Endpoint Detection And Response (EDR)?
Read
What is a Golden Ticket Attack?
Read
What is Initial Access?
Read
What is an Insider Threat?
Read
What is an Initial Access Broker (IAB)?
Read
What is Exploitation In The Context Of Cybersecurity?
Read
What is a Honeypot?
Read
What is Immutability?
Read
What is IcedID?
Read
What is an Immutable Backup?
Read
What is Incident Response?
Read
What is an Indicator Of Compromise?
Read
What are LOLBins?
Read
What is a Loader?
Read
What is Machine Learning?
Read
What is Locker Ransomware?
Read
What is LSASS?
Read
What is a Keylogger?
Read
What is a Logic Bomb?
Read
What are Intrusion Detection And Prevention Systems (IDS/IPS)?
Read
What is Lateral Movement?
Read
What is 'Living Off The Land'?
Read
What is Kerberoasting?
Read
What is LockerGoga?
Read
What is Malspam?
Read
What is MITRE ATT&CK?
Read
What is Managed Detection And Response (MDR)?
Read
What is Managed Security Service Provider (MSSP)?
Read
What is a Man-In-The-Middle (MITM) Attack?
Read
What is Malware?
Read
What is a Malicious Macro?
Read
What is Managed Detection And Response (MDR)?
Read
What is Mimikatz?
Read
What is Metasploit?
Read
What is Multi-Factor Authentication (MFA)?
Read
What is Pass-The-Ticket?
Read