Ransomware Research Center
Experiencing an Attack?
Why Halcyon
Back to Main
The Halcyon Difference
Our Story
Awards and Recognition
Our Customers
Our Partners
The Halcyon Guarantee
Platform
Back to Main
Halcyon Anti-Ransomware Platform
Platform Overview
How it Works
Ransomware Warranty
Key Capabilities
Prevent Ransomware
Stop Data Exfiltration & Extortion
Recover Encrypted Data
Get 24x7 Expert-Led Monitoring
Services
Back to Main
Professional Services
Emergency Ransomware Recovery
Pre-Event Hardening & Assessments
Included Services
24x7 Ransomware Detection & Recovery
Customer Success
Solutions
Back to Main
Halcyon + Tech
Halcyon + Endpoint Detection & Response (EDR)
Halcyon + Backup Solutions
Solutions By Industry
Education
Energy
Federal
Finance
Government
Healthcare
Manufacturing
Retail
Technology
Telecommunications
Transportation
Resources
Back to Main
Watch
Product Tours
Videos
Webinars
Read
Blog
Customer Stories
Data Sheets
Newsroom
Ransomware 101
Research Reports
White Papers
Connect
Events
All Resources
Get a Demo
Ransomware Research Center
Experiencing an Attack?
Get a Demo
Featured Articles
What is Anti-Ransomware?
What is Ransomware-as-a-Service (RaaS)?
What is Resilience in Security?
What Should You Do if Attacked with Ransomware?
Can ransomware infect a USB drive?
FAQ Categories
Cybersecurity Basics
Is Ransomware Malware?
What is Artificial Intelligence (AI) in Security?
What is Machine Learning (ML) in Security?
What is Anti-Ransomware?
What is Cyber Insurance?
What is Double Extortion?
What is the Dark Web?
What is Antivirus (AV)?
What is Endpoint Protection (EPP)?
What is Next Generation Antivirus (NGAV)?
What is Extended Detection and Response (XDR)?
Ransomware Fundamentals
What is Ransomware?
What sort of devices can ransomware infect?
What is a ransomware campaign?
What is Ransomware-as-a-Service (RaaS)?
Why Does Ransomware Exfiltrate Data?
What language in ransomware coded in?
What Does Ransomware Do?
How does ransomware work?
How is Ransomware Delivered?
How does ransomware spread?
How Does Ransomware Infect?
How Do Most Ransomware Attacks Happen?
What is an Encryption Key?
What does ransomware do to an endpoint device?
Ransomware Defense
What is Ransomware Prevention?
What is Resilience in Security?
How Can You Be Resilient Against Ransomware?
Can Ransomware Infect Backups?
Can Ransomware Infect Cloud Storage?
How Do You Mitigate a Ransomware Attack?
How Does Ransomware Bypass Security?
How Does Ransomware Exfiltrate Data?
What File extensions does ransomware leave or change?
Ransomware Recovery
How Do You Recover Files After a Ransomware Attack?
How Do You Recover from a Ransomware Attack?
How Do You Report a Ransomware Attack?
How Can Ransomware Be Removed?
Does Cyber Insurance Cover Ransomware?
How Long Does It Take to Recover from Ransomware?
What to do after a ransomware attack?
What to do if your computer is infected with ransomware?
What is a Ransomware Rollback?
What Should You Do if Attacked with Ransomware?
Assets at Risk
Can ransomware infect a flash drive?
Can ransomware infect a GPU?
Can ransomware infect a network?
Can ransomware infect a USB drive?
Can ransomware infect and encrypt your smartphone?
Can ransomware infect backups?
Can ransomware infect encrypted backups?
Can ransomware infect Google Drive?
Can ransomware infect iCloud?
Can ransomware infect iPads?
Can ransomware infect linux?
Can ransomware infect macOS?
Can ransomware infect mobile devices?
Can ransomware infect nas drive?
Can ransomware infect network drives?
Can ransomware infect onedrive?
Can ransomware infect phones?
Can ransomware infect routers?
Can ransomware infect Sharepoint?
Can ransomware infect Windows?
Ransomware Terminology
What is Playbook/Runbook?
What is Pass-The-Hash?
What is Phishing?
What is Obfuscation?
What is Persistence In Cybersecurity?
What is Pivoting In Cyberattacks?
What is Network Segmentation?
What is Polymorphic Malware?
What is Privilege Escalation?
What is Process Injection?
What is the Principle Of Least Privilege?
What is Next Generation Antivirus (NGAV)?
What is Ransomware Gang?
What is Process Hollowing?
What is Pysa?
What is PowerShell Empire?
What is Resilience?
What is RSA Encryption?
What is Rivest–Shamir–Adleman (RSA)?
What is a Reverse Shell?
What is Reconnaissance In Cybersecurity?
What is a Remote Access Trojan (RAT)?
What is Remote Code Execution (RCE)?
What is Ransomware Campaign?
What is PsExec?
What is Scareware?
What is Spear Phishing?
What is Shellcode?
What is SQL Injection?
What is Social Engineering?
What is Spyware?
What is Security Bypass In Cybersecurity?
What is SOC/SOCaaS?
What is Service Level Agreement (SLA)?
What is Tabletop Exercise?
What is Threat Hunting?
What is Triple Extortion?
What is a Trojan Horse?
What is Symmetric Encryption?
What is a User Account Control (UAC) Bypass?
What is a Supply Chain Attack?
What is Time-To-Ransom?
What is Remote Desktop Protocol (RDP)?
What is a Watering Hole Attack?
What is a Web Shell?
What is a Zero-Day Vulnerability?
What is a Wiper Malware?
What is Volume Shadow Copy?
Previous
2 / 2
FAQ List
FAQs
Ransomware Terminology
Ransomware Terminology
What is Air Gapping?
Read
What is AdFind?
Read
What is a Ransomware Affiliate?
Read
What is an Advanced Persistent Threat (APT)?
Read
What is the Advanced Encryption Standard (AES)?
Read
What is an Attack Surface?
Read
What is Backup Destruction?
Read
What is Asymmetric Encryption?
Read
What is Big-Game Hunting?
Read
What is Bitcoin?
Read
What is Anti-Ransomware?
Read
What is Adware?
Read
What is Artificial Intelligence (AI) In Security?
Read
What is Antivirus (AV)?
Read
What is Covenant?
Read
What is a Brute Force Attack?
Read
What is Cobalt Strike?
Read
What is Brute Ratel?
Read
What is a Bootkit?
Read
What is BloodHound?
Read
What is Code Signing Abuse?
Read
What is a CVE?
Read
What is a Buffer Overflow?
Read
What is Command And Control (C2)?
Read
What is an Attack Vector?
Read
What is Botnet?
Read
What is Credential Dumping?
Read
What is a Data Breach?
Read
What is Data Encryption?
Read
What is Data Exfiltration?
Read
What is Cyber Insurance?
Read
What is Cross-Site Scripting (XSS)?
Read
What is CryptoLocker?
Read
What is Credential Harvesting?
Read
What is the Cyber Kill Chain?
Read
What is Crypto Ransomware?
Read
What is Cryptocurrency?
Read
What is Credential Stuffing?
Read
What is Decryption?
Read
What is Data Loss Prevention (DLP)?
Read
What is Defense Evasion?
Read
What is a Data Leak Site?
Read
What is a Distributed Denial Of Service Attack?
Read
What is DCShadow?
Read
What is DCSync?
Read
What is Dwell Time In Cybersecurity?
Read
What is DLL Sideloading?
Read
What is Double Extortion?
Read
What is a Dropper?
Read
What is a Drive-By Download?
Read
What is DLL Injection?
Read
What is DNS Tunneling?
Read
What is a Domain Generation Algorithm (DGA)?
Read
What is an Exploit In Cybersecurity?
Read
What is EternalBlue?
Read
What is Endpoint Detection And Response (EDR)?
Read
What is an Exploit Kit?
Read
What is Endpoint Protection (EPP)?
Read
What is Encryption Key?
Read
What is Emotet?
Read
What is Empire?
Read
What is Fileless Malware?
Read
What is Extended Detection And Response (XDR)?
Read
What is Encryption?
Read
What is Endpoint Detection And Response (EDR)?
Read
What is a Golden Ticket Attack?
Read
What is Initial Access?
Read
What is an Insider Threat?
Read
What is an Initial Access Broker (IAB)?
Read
What is Exploitation In The Context Of Cybersecurity?
Read
What is a Honeypot?
Read
What is Immutability?
Read
What is IcedID?
Read
What is an Immutable Backup?
Read
What is Incident Response?
Read
What is an Indicator Of Compromise?
Read
What are LOLBins?
Read
What is a Loader?
Read
What is Machine Learning?
Read
What is Locker Ransomware?
Read
What is LSASS?
Read
What is a Keylogger?
Read
What is a Logic Bomb?
Read
What are Intrusion Detection And Prevention Systems (IDS/IPS)?
Read
What is Lateral Movement?
Read
What is 'Living Off The Land'?
Read
What is Kerberoasting?
Read
What is LockerGoga?
Read
What is Malspam?
Read
What is MITRE ATT&CK?
Read
What is Managed Detection And Response (MDR)?
Read
What is Managed Security Service Provider (MSSP)?
Read
What is a Man-In-The-Middle (MITM) Attack?
Read
What is Malware?
Read
What is a Malicious Macro?
Read
What is Managed Detection And Response (MDR)?
Read
What is Mimikatz?
Read
What is Metasploit?
Read
What is Multi-Factor Authentication (MFA)?
Read
What is Pass-The-Ticket?
Read