<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ransomware Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/tag/ransomware/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/tag/ransomware</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Sun, 09 Feb 2025 18:52:45 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>ransomware Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/tag/ransomware</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Ransomware Resilience Starts in the Mind: Overcoming Cognitive Biases and Decision-Making Errors in Cybersecurity</title>
		<link>https://jeanchristophvonoertzen.com/ransomware-resilience-cognitive-biases</link>
					<comments>https://jeanchristophvonoertzen.com/ransomware-resilience-cognitive-biases#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sun, 09 Feb 2025 18:52:45 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[awareness training]]></category>
		<category><![CDATA[Psychologie]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security awareness]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1510</guid>

					<description><![CDATA[<p>Why We Keep Losing Despite Stronger Security Controls Over the past three years, businesses have almost doubled their confidence in cybersecurity—rising from 32% in 2021 to 54% in 2024 (The Global Cost of Ransomware Study, 2025). Despite this, ransomware’s impact has only grown: 40% of affected companies suffered significant revenue losses, 58% experienced operational downtime, [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/ransomware-resilience-cognitive-biases">Ransomware Resilience Starts in the Mind: Overcoming Cognitive Biases and Decision-Making Errors in Cybersecurity</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/ransomware-resilience-cognitive-biases/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway &#8211; Nuclear Ransomware 3.0: We Thought It Was Bad and Then It Got Even Worse</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-nuclear-ransomware-3-0-we-thought-it-was-bad-and-then-it-got-even-worse</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-nuclear-ransomware-3-0-we-thought-it-was-bad-and-then-it-got-even-worse#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 19 Jan 2022 20:26:26 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[social engineering]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=598</guid>

					<description><![CDATA[<p>My key takeaways PC Cyborg AIDS trojan in 1998 =&#62; first known ransomware $189 asked as ransom CryptoLocker, 2013 first to ask for Bitcoin &#34;Ransomware 2.0&#34;, from 2019 made backups less of a protection the access to the victim becomes the &#34;gold&#34; Todays ransomware workflow stager look around (trickbot) and calling home (C2 server) if [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-nuclear-ransomware-3-0-we-thought-it-was-bad-and-then-it-got-even-worse">Webinar takeaway &#8211; Nuclear Ransomware 3.0: We Thought It Was Bad and Then It Got Even Worse</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-nuclear-ransomware-3-0-we-thought-it-was-bad-and-then-it-got-even-worse/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Event takeaway: Deutscher IT-Security Kongress</title>
		<link>https://jeanchristophvonoertzen.com/event-takeaway-deutscher-it-security-kongress</link>
					<comments>https://jeanchristophvonoertzen.com/event-takeaway-deutscher-it-security-kongress#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 07 Oct 2021 19:09:39 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[awareness training]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[MS365]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=561</guid>

					<description><![CDATA[<p>My key takeaways hardening backup systems is key disconnected from the AD designed in a way, that it may continue functioning even if all other systems are shut down due to testing and verification of software patches in most B2B environments before rollout, the time a system remains unpatched is prolonged more time for the [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/event-takeaway-deutscher-it-security-kongress">Event takeaway: Deutscher IT-Security Kongress</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/event-takeaway-deutscher-it-security-kongress/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: New Wave of Ransomware Attacks: How did this happen?</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-new-wave-of-ransomware-attacks-how-did-this-happen</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-new-wave-of-ransomware-attacks-how-did-this-happen#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 19:20:45 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=476</guid>

					<description><![CDATA[<p>My key takeaways compliance documents are not written by technical people compliance is not about security people tend to meet the minimum, not more GDPR is an accountability framework not a compliance framework &#34;Security is a cost center&#34; a management statement calling for trouble the goal of a VC backed vendor is the best possible [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-new-wave-of-ransomware-attacks-how-did-this-happen">Webinar takeaway: New Wave of Ransomware Attacks: How did this happen?</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-new-wave-of-ransomware-attacks-how-did-this-happen/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar Takeaway: EMERGENCY WEBCAST: OK, let´s talk about ransomware&#8230;</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-emergency-webcast-ok-lets-talk-about-ransomware</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-emergency-webcast-ok-lets-talk-about-ransomware#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 11 May 2021 17:52:08 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[deception]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=445</guid>

					<description><![CDATA[<p>My key takeaways 3 types of ransomware encrypt hard drive steal files and data and threat to release them both 1 &#38; 2 Ransomware gangs usually have great customer support it has become a serious business It doesn&#8217;t matter if you consider your organsiation a valuable target, if at least some money could be extorted [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-emergency-webcast-ok-lets-talk-about-ransomware">Webinar Takeaway: EMERGENCY WEBCAST: OK, let´s talk about ransomware&#8230;</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-emergency-webcast-ok-lets-talk-about-ransomware/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: A Master Class on IT Security &#8211; Roger Grimes Teaches Ransomware Mitigation</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-a-master-class-on-it-security-roger-grimes-teaches-ransomware-mitigation</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-a-master-class-on-it-security-roger-grimes-teaches-ransomware-mitigation#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 10 Feb 2021 21:00:45 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[webinar takeaway]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=375</guid>

					<description><![CDATA[<p>My key takeaways often ransomeware dwells 8mo-1yr before detection or execution since 1989 AIDS/PC Cyborg Trojan since end 2019 data exfiltration get more and more common with ransomware today access to network is more worry than encrypted files droppers are often not recognized by AV/EDR 2% of revenue is common request for ransom stolen data [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-a-master-class-on-it-security-roger-grimes-teaches-ransomware-mitigation">Webinar takeaway: A Master Class on IT Security &#8211; Roger Grimes Teaches Ransomware Mitigation</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-a-master-class-on-it-security-roger-grimes-teaches-ransomware-mitigation/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: How to Cover C&#038;C in the MITRE ATT&#038;CK Matrix</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-cover-cc-in-the-mitre-attck-matrix</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-cover-cc-in-the-mitre-attck-matrix#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 17 Nov 2020 16:43:46 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[threat hunting]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=251</guid>

					<description><![CDATA[<p>My key takeaways Modern threats are almost impossible to detect by signatures or heuristics command and control channels (C2) now are often using common encryption like https so content analysis is not an option either Well known and legit websites are abused as C2 channels like Google Mail or O365 Even CDNs are used as [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-cover-cc-in-the-mitre-attck-matrix">Webinar takeaway: How to Cover C&#038;C in the MITRE ATT&#038;CK Matrix</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-cover-cc-in-the-mitre-attck-matrix/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
