Check out our companion blog!

Videos

Feb. 9, 2026

Ransomware as a Service Explained: Your Lemonade Stand Analogy #shorts

Ransomware as a Service Explained: Your Lemonade Stand Analogy #shorts

Ransomware as a service is like a franchise—anyone can buy in. You don't have to be technical, but you take on all the risk. It's all on you once it's set up. 🤔 #Ransomware #CyberSecurity #DataProtection #Cybercrime

View more
Feb. 9, 2026

Ransomware Evolution: Double Extortion and AI Threats #shorts

Ransomware Evolution: Double Extortion and AI Threats #shorts

Ransomware isn't just about encrypted files anymore. Now, attackers are after your personal photos. Will you pay to keep them private? Don't let AI-manipulated images ruin your life. #Ransomware #CyberSecurity #DataPrivacy #AIManipulation

View more
Feb. 9, 2026

Ransomware Attack: Distraction for Bigger Cyber Threats! #shorts

Ransomware Attack: Distraction for Bigger Cyber Threats! #shorts

A Department of Defense contractor is about to get hit with ransomware. But the ransomware is just a distraction for a bigger attack. Recovery Is a Choice. #Ransomware #CyberAttack #DataBreach #CyberSecurity

View more
Feb. 9, 2026

Exploiting Vulnerable Employees for Corporate Espionage #shorts

Exploiting Vulnerable Employees for Corporate Espionage #shorts

Targeting facilities? Open-source intel reveals employees with financial woes or personal crises. A cash offer can be surprisingly effective in gaining insider help. It highlights the need for constant vigilance. #InsiderThreats #SocialEngineering #CyberSecurity #DataBreach

View more
Feb. 9, 2026

A Brief History of Ransomware

A Brief History of Ransomware

A history of ransomware is more than just dates and names—it's the story of how criminals evolved from mailing infected floppy disks in 1989 to running billion-dollar enterprises that cripple entire organizations. On this episode of The Backup Wrap-up, I sit down with Dr. Mike Saylor, my co-author on "Learning…

View more
Feb. 9, 2026

Cyber Attack: How Hackers Compromised Pepsi's Marketing Data #shorts

Cyber Attack: How Hackers Compromised Pepsi's Marketing Data #shorts

A marketing person's laptop was compromised, giving hackers access to Pepsi's marketing files. They infected files uploaded to an FTP site, embedding malware in a million surveys. Business process compromise at its finest. #Cybersecurity #DataBreach #Hacking #InfoSec #BusinessSecurity

View more
Feb. 9, 2026

A History of Ransomware: How Criminals Built Billion-Dollar Enterprises

A History of Ransomware: How Criminals Built Billion-Dollar Enterprises

A history of ransomware reveals how cybercriminals evolved from mailing infected floppy disks to running sophisticated billion-dollar criminal enterprises. Join us and Dr. Mike Saylor, my co-author on "Learning Ransomware Response and Recovery," as we trace the complete evolution of ransomware from its humble beginnings to the threat it is…

View more
Feb. 6, 2026

Cyber Reconnaissance: Understanding Your Digital Catch #shorts

Cyber Reconnaissance: Understanding Your Digital Catch #shorts

Once you've got something on the line, what do you do? Understand what you've gained access to. Is it bait, a stepping stone, or something valuable that needs immediate attention? #Reconnaissance #CyberSecurity #DataAnalysis #RiskAssessment

View more
Feb. 6, 2026

Malware Spreading: How Hackers Infect Your Devices #shorts

Malware Spreading: How Hackers Infect Your Devices #shorts

Malware doesn't stay put. Its goal? Spread and persist. Once inside, it searches everything, infecting other machines. Antivirus is often a step behind, giving attackers time to adapt. #Malware #CyberSecurity #DataProtection #VirusRemoval

View more
Feb. 6, 2026

Ransomware Attack: What to Do if Data is Encrypted #shorts

Ransomware Attack: What to Do if Data is Encrypted #shorts

When your data is encrypted and you're forced to negotiate with cybercriminals, ensure you have robust backups. Always demand proof of life before any payment. Recovery is a choice. #DataEncryption #CyberSecurity #Ransomware #BackupStrategy

View more
Feb. 6, 2026

Ransomware: How Attackers Negotiate Encryption Keys #shorts

Ransomware: How Attackers Negotiate Encryption Keys #shorts

Cybercriminals rent servers on the darknet to launch attacks. They pre-configure malware, call home, negotiate encryption keys. It's a race against the clock. #CyberSecurity #Ransomware #Darknet #Malware

View more
Feb. 6, 2026

Stolen Credentials: The #1 Path to Cyber Intrusions #shorts

Stolen Credentials: The #1 Path to Cyber Intrusions #shorts

Is stolen credentials the most common way hackers get into environments? Experts agree: Yes. Secure your accounts to avoid becoming a victim. #CyberSecurity #DataBreach #PasswordSecurity #Ransomware

View more
Feb. 5, 2026

AI Transforms Email Marketing: More Clicks, More Reach! #shorts

AI Transforms Email Marketing: More Clicks, More Reach! #shorts

AI is revolutionizing email. Tailored messages, perfect tone, high open rates. Is this the future of connection or just sophisticated spam? The line blurs. #EmailMarketing #AIRevolution #DigitalMarketing #TechTrends

View more
Feb. 5, 2026

Cybersecurity: Double Extortion Attack Explained #shorts

Cybersecurity: Double Extortion Attack Explained #shorts

Double extortion isn't just one attack. Spray-and-pray meets recon-and-exploit. When attackers find a valuable target, they exfiltrate data... and ransomware happens. #Ransomware #DataBreach #CyberSecurity #DataExtortion

View more
Feb. 5, 2026

Ransomware Explained: How Hackers Target Your Files #shorts

Ransomware Explained: How Hackers Target Your Files #shorts

Ransomware's final step? Delivering the ransom note. Today's sophisticated hackers plant text files in every encrypted folder, from your desktop to My Documents. Learn how they bypass file extensions to find your data. #Ransomware #CyberSecurity #DataEncryption #Malware

View more
Feb. 5, 2026

5 Ransomware Objectives: Encryption & Exfiltration Revealed #shorts

5 Ransomware Objectives: Encryption & Exfiltration Revealed #shorts

Ransomware attacks aim to encrypt your data, holding it hostage. Exfiltration may come first. Understand the steps to protect yourself from these threats. Learn how to recover effectively. #Ransomware #Cybersecurity #DataEncryption #DataRecovery

View more
Feb. 5, 2026

Ransomware Explained: How Law Enforcement Helps Victims #shorts

Ransomware Explained: How Law Enforcement Helps Victims #shorts

Some ransomware skips negotiation, using hard-coded encryption. The FBI can sometimes use decryption keys from past victims of the same strain to help new victims recover their data. #Ransomware #CyberSecurity #FBI #DataRecovery #Encryption

View more
Feb. 5, 2026

Cybersecurity: Initial Access Explained - Email vs. Credentials #shorts

Cybersecurity: Initial Access Explained - Email vs. Credentials #shorts

How do ransomware attacks start? Sometimes, criminals buy stolen credentials from initial access brokers—bypassing the need for phishing emails. Understanding IABs is key to defense. #Ransomware #Cybersecurity #InfoSec #DataBreach

View more
Feb. 4, 2026

Ransomware Tactics: Data Exfiltration & Double Extortion Revealed #shorts

Ransomware Tactics: Data Exfiltration & Double Extortion Revealed #shorts

Advanced ransomware groups now exfiltrate data for double extortion. If you refuse to pay, they'll expose your sensitive information to regulators, insurance carriers, or even your board. Recovery is a choice. #Ransomware #Cybersecurity #DataBreach #DataProtection

View more
Feb. 4, 2026

Cyber Threat Actors: The Role of Initial Access Brokers #shorts

Cyber Threat Actors: The Role of Initial Access Brokers #shorts

Initial access brokers collect, buy, and resell credentials. They validate millions to increase value. It's a full-time job for bad actors in the cybercrime world. Ransomware recovery is a choice. #InitialAccess #Cybercrime #Ransomware #CredentialTheft

View more
Feb. 4, 2026

Ransomware Attack: How They Target and Extort? #shorts

Ransomware Attack: How They Target and Extort? #shorts

Ransomware attackers target regulated institutions with real penalties for data breaches. Healthcare, finance, and education are prime targets. Double extortion and regulator notification are now common tactics. #Ransomware #Cybersecurity #DataBreach #CyberAttack

View more
Feb. 4, 2026

Ransomware Tactics: Data Exfiltration & Double Extortion #shorts

Ransomware Tactics: Data Exfiltration & Double Extortion #shorts

Hackers aren't just after ransoms anymore. They exfiltrate your data as a Plan B. Don't pay? Your files get leaked. A second extortion attempt you can't ignore. #DataSecurity #Ransomware #Cybersecurity #DataBreach

View more
Feb. 4, 2026

Ransomware Attack: Law Enforcement & Double Extortion Secrets #shorts

Ransomware Attack: Law Enforcement & Double Extortion Secrets #shorts

Law enforcement combats ransomware by sharing decryption keys. If the FBI helped company A with ransomware strain A, they might use that key to help you. #Ransomware #Cybersecurity #DataRecovery #FBI

View more
Feb. 4, 2026

Ransomware as a Service: The Darknet Entrepreneur's Secret Weapon #shorts

Ransomware as a Service: The Darknet Entrepreneur's Secret Weapon #shorts

Bad actors now offer ransomware as a service. Pay them $30k, and they'll launch a campaign, handle the tech, and deposit money—complete with customer service. Cybercrime made easy? #Ransomware #Cybersecurity #DarkNet #Cybercrime #DataBreach

View more