ThreatDown Powered by Malwarebytes
  • Nebula support
  • OneView support
  • Nebula sign in
  • OneView sign in
  • Partner Portal sign in
    • Products

    • Endpoint Detection & Response (EDR)
    • Endpoint Protection
    • Vulnerability Assessment
    • Patch Management
    • Application Block
    • DNS Filtering
    • Mobile Security
    • Email Security
    • Services

    • Managed Detection & Response (MDR)
    • Managed Threat Hunting
    • Premium Support
    • Features

    • Browser Phishing Protection
    • Firewall Management
    • Security Advisor
    • Platforms

    • Nebula
    • Manage your organization’s endpoint security in a single-tenant console

      Nebula customer sign in >

    • OneView
    • Provides MSPs centralized visibility and management capabilities across customer sites

      OneView customer sign in >

    • Explore Partnerships
    • Review program benefits, innovative technology, channel first mentality

    • Managed Service Providers
    • Everything MSPs need to run their business seamlessly

    • Technology Partners
    • Explore our technology integrations

    • Resellers
    • Build growth, profitability, and customer loyalty

    • Retain and grow your business with tools, education, and support in the partner experience center.

      Sign in to PXC >

    • Threat Center
    • Learn about the latest threat news

    • Reports
    • Threat Detections
    • Executive POV
    • Glossary
    • Blog
    • Resource Center
    • Learn more about ThreatDown

    • ThreatDown News
    • Case Studies
    • Products & Review
    • Cybersecurity Tips & Tricks
    • Webinars
    • About Us
    • 2025 State of Ransomware: Inside a record-breaking year of ransomware attacks
    • Discover a record-breaking year of attacks where ransomware became decentralized and unpredictable, spreading further than ever before.

      Download now >

    Pricing
    • Why ThreatDown

    • About Us
    • ThreatDown vs. Competition
    • Case Studies
    • ThreatDown named Product of the Year by MRG Effitas.

      Learn more >

    Get a quote
    Buy now
    Home > Blog

    ThreatDown Intelligence

    chess player paying his opponent

    Ransomware

    A history of ransomware: How did it get this far?

    5 minutes
    broken link in a chain

    News

    Supply chain related security risks, and how to protect against them

    4 minutes

    Categories

    Breaches
    Product News
    Ransomware
    Threat Intelligence
    Vulnerabilities

    Threat Intelligence

    Prompt injection could be the SQL injection of the future, warns NCSC

    3 minutes
    map of the world projected on a face

    Ransomware

    Qakbot botnet infrastructure suffers major takedown

    4 minutes

    Ransomware

    Social Security Numbers leaked in ransomware attack on Ohio History Connection

    2 minutes
    3 reasons why your endpoint security is not enough

    Business

    3 reasons why your endpoint security is not enough

    1 minute
    How “EDR Extra Strength” simplifies traditional EDR complexity

    Business

    How “EDR Extra Strength” simplifies traditional EDR complexity

    3 minutes
    Cisco logo

    Ransomware

    Cisco VPNs without MFA are under attack by ransomware operator

    2 minutes

    Breaches

    Meal delivery service PurFoods announces major data breach

    2 minutes

    Vulnerabilities

    FBI confirms Barracuda patch is not effective for exploited ESG appliances

    3 minutes

    Posts pagination

    < 1 … 35 36 37 38 39 … 89 >
    ThreatDown Powered by Malwarebytes

    Products & Services

    Endpoint Detection & Response
    Endpoint Protection
    Managed Detection & Response
    Pricing

    Partners

    MSP
    Resellers
    Technology Partners
    Become a Partner

    Resources

    Threat Center
    Resource Center
    Blog
    Glossary

    Managed Services Terms & Conditions

    Managed Service Terms
    MTH Service Description
    MDR Service Description

    Support

    Nebula Support
    OneView Support

    Get in Touch

    Contact Us
    Schedule a Meeting
    Request a Demo

    ThreatDown Newsletter

    Get cybersecurity news and tips from our security experts in your mailbox.

  • Legal
  • Privacy
  • Accessibility
  • Compliance Certifications
  • Vulnerability Disclosure
  • Terms of Service
  • © 2025 All Rights Reserved