Get to know our company, story, and its mission.
See media coverage, get a brand press kit, or inquire.
Learn about our technology alliances, integrations, and channel partners
Discover all upcoming events where you can meet the Halcyon team.
We're hiring worldwide for a variety of fully remote roles.
Get in touch with us, ask questions, or give feedback.
View our RaaS Group Top Power Rankings in the Ransomware Malicious Quartile
Learn how the world's important companies are fighting ransomware.
Read the latest in cybersecurity threats, ransomware, news, and more.
Keep up to date with our ransomware watchtower site, and attack tracking map.
Explore answers and insights into cybersecurity and ransomware.
Understanding ransomware groups and their similarities to SaaS companies.
Calculate the ROI of Halcyon versus your organization's potential ransomware risk.
Cybersecurity terminology decoded in a comprehensive guide.
Dive into the aggregated stats to discover the true impact of ransomware.
Welcome to Halcyon's hub for the latest in anti-ransomware, threat intel content, from webinars to white papers, and more.
View Top RaaS Group Power Rankings in the Ransomware Malicious Quartile
Calculate the ROI of Halcyon vs. your organization's ransomware risk.
Keep up to date with our watchtower site, and attack tracking map.
The significant costs associated with trying to mitigate ransomware risk has carried a diminishing return and resulted in deploying incomplete solutions to a new and evolving threat. However, the cost to respond and recover from a ransom is significantly higher than trying to prevent it.
From the proto-viruses of the 1970s like Creeper to full-blown cyber weapons like Stuxnet and the rise of nation-state Advanced Persistent Threat (APT) groups, the history of malware has continued to evolve from the moment computers were first networked together. For most of this history, viruses, and malware were used for experimentation, hacktivism, denial of resources, and espionage but as digital currencies like Bitcoin took off, so did the ultimate form of cybercrime: ransomware.
The Halcyon Advantage lies in our Technology Differentiation: Halcyon is the first contextually aware and self-healing endpoint agent that prevents catastrophic failure due to ransomware. The Halcyon Platform has four layers of self-healing ransomware protection to augment and armor your security stack, while significantly reducing your ransomware risk.
The true effects of ransomware expand far beyond the initial disruption and subsequent ransom payment. While the costs of a ransomware attack on an organization are too disruptive to leave to a single product or AI behavioral model. This infographic breaks down the how the attack's ransom is just the impact epicenter of the blast radius set in motion. This datasheet outlines and details the latest in ransomware attack impact.
The Halcyon team of ransomware experts has compiled this RaaS Power Rankings guide for the ransomware threat landscape based on data from 2023's first quarter
The targets of a ransomware attack aren't just big businesses, it's anyone with digital operations and an online footprint. Ransomware Groups have expanded their cyberattack operations to target government entities of all sizes. With a low cost of entry and a high success rate, these attacks have caused over $70B in damage between 2018 and 2022. This infographic breaks down the full scope.
The targets of a ransomware attack aren't just big businesses, it's anyone with digital operations and an online footprint. Ransomware Groups are moving down market. In the last two years criminal ransomware groups have expanded their cyber attack operations to a new and vulnerable segment – small and medium-sized businesses (SMBs). This infographic breaks down the latest impacts.
Modern endpoint defensive products use a point-in-time analysis of any new binary introduced or executed on a system.Binaries are very rarely re-examined after the initial analysis labels it “good” or “bad.” Halcyon is different.
Foundations, Part Two, know thy enemy. Take a look at how ransomware has made headlines over the past few years, and it seems that every week there is another news story about an organization victimized by ransomware. Security leaders need to understand what is driving these seemingly endless waves of attacks and the evolution from one-off breaches to criminal enterprises worth millions of dollars.
Ransomware is an online attack perpetrated by cybercriminals or nation state-sponsored groups who demand a monetary ransom to release their hold on encrypted or stolen data. In the past decade, ransomware attacks have evolved from a consumer-level nuisance of fake antivirus products to sophisticated malware with advanced encryption capabilities that target primarily public and private sector organizations. While threat intelligence can help uncover what organizations may be considered primary targets at any given time, no single industry, geography, or size of business is immune.
The effects of a ransomware attack expand far beyond the initial disruption and subsequent ransom payment. The toll it takes on an organization are too disruptive to leave to a single product or AI behavioral model. The true costs of ransomware undulate outwards in an exponential blast radius. This infographic breaks down the latest in attack impact.