SIGN IN
Nebula sign in
OneView sign in
Partner Portal sign in
Products
< Products
Products
Endpoint Detection & Response (EDR)
Endpoint Protection
Vulnerability Assessment
Patch Management
Application Block
DNS Filtering
Mobile Security
Services
Managed Detection & Response (MDR)
Managed Threat Hunting
Premium Support
Why ThreatDown
vs Webroot
vs Bitdefender
vs ESET
More competitor comparisons >
Platforms
< Platforms
Nebula
Single-tenant console that allows you to manage your organization’s endpoint security
Nebula customer sign in >
OneView
Multi-tenant console for MSPs that provides centralized visibility and management capabilities across all your customer sites
OneView customer sign in >
Partners
< Partners
Explore Partnerships
Review program benefits, innovative technology, channel first mentality
Managed Service Providers
Everything MSPs need to run their business seamlessly
Technology Partners
Explore our technology integrations
Resellers
Build growth, profitability, and customer loyalty
Retain and grow your business with tools, education, and support in the partner experience center.
Sign in to PXC >
Resources
< Resources
Blog
Get the latest news and threat intelligence
.
Resource Center
Access reports, data sheets, case studies and webinars
Glossary
Look up cybersecurity terms and definitions
.
About Us
Learn about our history, what sets our technology apart, and how to join our team
Learn how to defend against the latest ransomware attacks
Download now >
Pricing
Support
< Support
Get Help
.
Nebula Support
Get help or ask questions about the Nebula platform
OneView Support
Get help or ask questions about the OneView platform
Managed Services Terms & Conditions
Managed Service Teams
Partner agreement for Managed Service Providers
MTH Service Description
Managed Threat Hunting overview, capabilities and support
MDR Service Description
Managed Detection and Response overview, capabilities and support
Login to your cloud console.
Sign in >
Get a quote
Home
>
Blog
raas
A history of ransomware: How did it get this far?
5 minutes
LockBit ransomware advisory from CISA provides interesting insights
3 minutes
The ransomware landscape changes as fewer victims decide to pay
3 minutes
North Korean APT targets US healthcare sector with Maui ransomware
2 minutes
It’s business as usual for REvil ransomware
3 minutes
Wanted! US offers $10m bounty for ransomware kingpins
3 minutes
BlackMatter ransomware group announces shutdown. But for how long?
3 minutes
Ransomware’s Russia problem
6 minutes
Threat spotlight: Conti, the ransomware used in the HSE healthcare attack
7 minutes
Threat spotlight: DarkSide, the ransomware used in the Colonial Pipeline attack
6 minutes
Categories
Breaches
Product News
Ransomware
Threat Intelligence
Vulnerabilities
Posts pagination
1
2
>
New
Buy Online
Partner Icon
Warning Icon