Check out our companion blog!

Videos

Feb. 17, 2026

Ransomware Decryption: The Private Key Explained #shorts

Ransomware Decryption: The Private Key Explained #shorts

Ransomware encrypts your files, holding the private key hostage. Pay within the deadline or lose access forever. Asymmetric encryption makes recovery extremely difficult, but not impossible. #Ransomware #Cybersecurity #DataRecovery #Encryption

View more
Feb. 17, 2026

Ransomware: Bitcoin, Logistics, and Hidden Strategies #shorts

Ransomware: Bitcoin, Logistics, and Hidden Strategies #shorts

Ransomware tactics evolved with Bitcoin. Early ransoms were affordable, but today's demands outstrip individual capacity, forcing complex logistics and shady Bitcoin machine meetups for illicit transactions. #Ransomware #Bitcoin #Cybercrime #Cybersecurity #DigitalCurrency

View more
Feb. 17, 2026

Foolproof Encryption: Secure Your Data, Avoid Ransom! #shorts

Foolproof Encryption: Secure Your Data, Avoid Ransom! #shorts

Ransomware attackers increase encryption strength to make recovery difficult, forcing victims to pay. The harder it is to break the encryption, the higher the chance of ransom payment. #Ransomware #Cybersecurity #Encryption #DataSecurity #Hacking

View more
Feb. 17, 2026

Criminal Ransomware: Understanding Payment Likelihood #shorts

Criminal Ransomware: Understanding Payment Likelihood #shorts

Discover CryptoLocker, a pioneer in ransomware that reshaped cybercrime. Learn how early operations assessed ransom feasibility and the shift from individual devices to crippling entire organizations. #CryptoLocker #Ransomware #Cybercrime #Cybersecurity #TechHistory

View more
Feb. 16, 2026

LastPass Hack: Stolen Crypto Keys and Drained Wallets #shorts

LastPass Hack: Stolen Crypto Keys and Drained Wallets #shorts

Remember the LastPass breach? Hackers stole encrypted vaults, then cracked them by targeting users who stored crypto passphrases inside. Beware: your wallet could be next. #Cybersecurity #LastPass #CryptoSecurity #Ransomware

View more
Feb. 16, 2026

Ransomware Wars: Criminals Decrypting Each Other's Victims! #shorts

Ransomware Wars: Criminals Decrypting Each Other's Victims! #shorts

Discover how ransomware actors sometimes decrypt files for free, even for rival gangs. Learn about the surprising 'honor among thieves' in the digital underworld and the efforts of white hats to help victims. #Ransomware #Cybersecurity #DataRecovery #WhiteHat #Tech

View more
Feb. 16, 2026

Ransomware Gangs Compete: Free Decryption Offered! #shorts

Ransomware Gangs Compete: Free Decryption Offered! #shorts

Even cybercriminals have rivals. One ransomware gang offered free decryption services to undermine a competitor. No honor among thieves in the digital underworld. #Ransomware #Cybercrime #Hacking #TechNews #InfoSec

View more
Feb. 16, 2026

Ransomware Competition: Decryptors For Free? #shorts

Ransomware Competition: Decryptors For Free? #shorts

Ransomware gangs sometimes compete, leading to a rival actor cracking keys and offering free decryption. A surprising twist in the cybercrime underworld. #Ransomware #Cybersecurity #Hacking #Decryptor #Cybercrime

View more
Feb. 16, 2026

The CryptoLocker Virus and the Birth of Modern Ransomware

The CryptoLocker Virus and the Birth of Modern Ransomware

The cryptolocker virus was the attack that turned ransomware from a nuisance into a full-blown criminal industry — and in this episode of The Backup Wrap-up, we break down exactly how that happened. W. Curtis Preston (Mr. Backup) sits down with co-host Prasanna Malaiyandi and cybersecurity expert Dr. Mike Saylor…

View more
Feb. 16, 2026

The CryptoLocker Virus: Encryption, Botnets & the Rise of Modern Ransomware

The CryptoLocker Virus: Encryption, Botnets & the Rise of Modern Ransomware

The cryptolocker virus changed cybercrime forever — here's how it worked and what it means for your backups today. In this episode of The Backup Wrap-up, I sit down with my co-host Prasanna Malaiyandi and Dr. Mike Saylor to break down the full evolution of ransomware, starting from the days…

View more
Feb. 16, 2026

New Ransomware Tactic: Extortion by Data Leaks Exposed! #shorts

New Ransomware Tactic: Extortion by Data Leaks Exposed! #shorts

Ransomware attackers are now going after the clients and students of breached companies. They threaten to release data unless the individual pressures the company to pay. #Ransomware #CyberSecurity #DataBreach #Privacy

View more
Feb. 11, 2026

Cyber Espionage: Nation States' Intelligence Gathering Secrets Revealed #shorts

Cyber Espionage: Nation States' Intelligence Gathering Secrets Revealed #shorts

Nation-state cyber activity focuses on intelligence gathering. Taking action compromises that intelligence, cutting off future collection. Understand the balance between intel and action. #CyberSecurity #NationState #Intelligence #CyberCrime

View more
Feb. 11, 2026

Ransomware as a Service: Criminal Enterprise Explained #shorts

Ransomware as a Service: Criminal Enterprise Explained #shorts

Ransomware isn't just one thing. It's a business model for some, a tool for others. Criminals use it. Nation states use it as a distraction. Recovery is a choice. #Ransomware #Cybersecurity #CriminalEnterprise #NationState #DataRecovery

View more
Feb. 11, 2026

DIY "Update" Postcards for Local Business Growth #shorts

DIY "Update" Postcards for Local Business Growth #shorts

A sneaky social engineer prints fake tech support postcards, plants them on desks, then calls users to reset passwords. Classic reverse phishing. #SocialEngineering #PhishingScam #TechSupport #Cybersecurity

View more
Feb. 11, 2026

Cybersecurity Evolution: From Servers to Your Phone #shorts

Cybersecurity Evolution: From Servers to Your Phone #shorts

Scary truth: bad actors analyze how companies & employees use tech to design attacks. From centralized servers to laptops & phones, they target vulnerabilities in end-user behavior for higher success. #CyberSecurity #DataBreach #InfoSec #Privacy

View more
Feb. 11, 2026

Cybercriminals' Evolution: CryptoLocker & Bitcoin's Role #shorts

Cybercriminals' Evolution: CryptoLocker & Bitcoin's Role #shorts

Why do cybercriminals love Bitcoin? Anonymity. In the early days, law enforcement didn't understand crypto, making it easy for bad actors to get paid and spend with relative impunity. Ransomware Recovery Is a Choice! #Bitcoin #Cybercrime #Ransomware #Crypto #Hacking

View more
Feb. 11, 2026

Ransomware Empire: CryptoLocker's Shocking Foundation Revealed #shorts

Ransomware Empire: CryptoLocker's Shocking Foundation Revealed #shorts

CryptoLocker paved the way for ransomware attacks. Bad actors tweak and redeploy existing frameworks, bypassing antivirus for weeks. A simple change avoids detection, building a massive criminal industry. #CryptoLocker #Ransomware #Cybersecurity #Malware #DataSecurity

View more
Feb. 11, 2026

Ransomware: Why Backups Still Matter (Double Extortion Explained) #shorts

Ransomware: Why Backups Still Matter (Double Extortion Explained) #shorts

Ransomware attacks now include data exfiltration. Is a good backup system pointless if you still pay ransom due to double extortion? The impact can lead to legal battles and regulatory issues. #Ransomware #DataSecurity #Cybersecurity #DataBackup #DataRecovery

View more
Feb. 10, 2026

Ransomware as a Service Explained: Your Lemonade Stand Analogy #shorts

Ransomware as a Service Explained: Your Lemonade Stand Analogy #shorts

Ransomware as a service is like a franchise—anyone can buy in. You don't have to be technical, but you take on all the risk. It's all on you once it's set up. 🤔 #Ransomware #CyberSecurity #DataProtection #Cybercrime

View more
Feb. 10, 2026

Insider Threats: The Real Danger Beyond Backups #shorts

Insider Threats: The Real Danger Beyond Backups #shorts

Rogue admins or planted insiders—are they real threats or just boogeymen? One Elon Musk company faced an employee propositioned to deploy malware for a ransom cut. It's more common than you think. #InsiderThreats #CyberSecurity #Ransomware #DataBreach

View more
Feb. 10, 2026

China & North Korea: State-Sponsored Cyber Warfare Revealed #shorts

China & North Korea: State-Sponsored Cyber Warfare Revealed #shorts

China turned gangs into hackers, funding attacks inside our borders. Plus, North Korea's inside game: planting agents with direct access. Traditional defenses are failing. What's the new strategy? #Cybersecurity #ChinaHacks #NorthKorea #CyberWarfare

View more
Feb. 10, 2026

Cybercrime: Nation States' Secret Weapon Revealed! #shorts

Cybercrime: Nation States' Secret Weapon Revealed! #shorts

How organized crime uses cybercrime for profit and espionage. Nation-state governments are also getting involved, creating complex global security risks. Is your business prepared? #Cybersecurity #CyberCrime #OrganizedCrime #NationState #InsiderThreat

View more
Feb. 10, 2026

China & North Korea: State-Sponsored Cyber Warfare Revealed #shorts

China & North Korea: State-Sponsored Cyber Warfare Revealed #shorts

China turned gangs into hackers, funding attacks inside our borders. Plus, North Korea's inside game: planting agents with direct access. Traditional defenses are failing. What's the new strategy? #Cybersecurity #ChinaHacks #NorthKorea #CyberWarfare

View more
Feb. 10, 2026

Insider Threats: The Real Danger Beyond Backups #shorts

Insider Threats: The Real Danger Beyond Backups #shorts

Rogue admins or planted insiders—are they real threats or just boogeymen? One Elon Musk company faced an employee propositioned to deploy malware for a ransom cut. It's more common than you think. #InsiderThreats #CyberSecurity #Ransomware #DataBreach

View more