Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration

T McIntosh, T Susnjak, T Liu, D Xu, P Watters… - ACM Computing …, 2024 - dl.acm.org
Ransomware has grown to be a dominant cybersecurity threat by exfiltrating, encrypting, or
destroying valuable user data and causing numerous disruptions to victims. The severity of …

Opportunities for early detection and prediction of ransomware attacks against industrial control systems

M Gazzan, FT Sheldon - Future Internet, 2023 - mdpi.com
Industrial control systems (ICS) and supervisory control and data acquisition (SCADA)
systems, which control critical infrastructure such as power plants and water treatment …

[HTML][HTML] Between a rock and a hard (ening) place: Cyber insurance in the ransomware era

G Mott, S Turner, JRC Nurse, J MacColl, J Sullivan… - Computers & …, 2023 - Elsevier
Cyber insurance and ransomware are two of the most studied areas within security research
and practice to date, and their interplay continues to raise concerns in industry and …

A framework for cyber-risk insurance against ransomware: A mixed-method approach

A Mukhopadhyay, S Jain - International Journal of Information Management, 2024 - Elsevier
Hackers follow a standard cyber kill chain process and install ransomware payloads using
phishing emails on firms belonging to critical industry, resulting in huge losses in revenue …

Understanding the state of criminological scholarship on cybercrimes

TJ Holt - Computers in Human Behavior, 2023 - Elsevier
Understanding the state of criminological scholarship on cybercrimes - ScienceDirect Skip to
main contentSkip to article Elsevier logo Journals & Books Search RegisterSign in View PDF …

The evolving menace of ransomware: A comparative analysis of pre-pandemic and mid-pandemic attacks

M Lang, L Connolly, P Taylor, PJ Corner - Digital Threats: Research and …, 2023 - dl.acm.org
Drawing upon direct interviews and secondary sources, this article presents a qualitative
comparative analysis of 39 ransomware attacks, 26 of which occurred shortly before the …

[HTML][HTML] Exploring public cybercrime prevention campaigns and victimization of businesses: A Bayesian model averaging approach

S Kemp - Computers & Security, 2023 - Elsevier
Cybercrime is a pressing concern for governments and businesses around the globe, but
little is known about what policy interventions work to prevent and mitigate threats to …

Developing resilient cyber-physical systems: a review of state-of-the-art malware detection approaches, gaps, and future directions

MI Malik, A Ibrahim, P Hannay, LF Sikos - Computers, 2023 - mdpi.com
Cyber-physical systems (CPSes) are rapidly evolving in critical infrastructure (CI) domains
such as smart grid, healthcare, the military, and telecommunication. These systems are …

Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial loss

T Meurs, M Junger, E Tews… - 2022 APWG symposium …, 2022 - ieeexplore.ieee.org
In recent years, ransomware attacks have led to disastrous consequences for victims, not
just due to the payment ransom amount but also due to the recovery costs associated with …

How cyber insurance influences the ransomware payment decision: theory and evidence

A Cartwright, E Cartwright, J MacColl, G Mott… - The Geneva Papers on …, 2023 - Springer
In this paper, we analyse how cyber insurance influences the cost–benefit decision-making
process of a ransomware victim. Specifically, we ask whether organisations with cyber …