<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Ransomware</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Ransomware</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/ransomware/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 09 Nov 2020 00:00:00 -0500</lastBuildDate><item><title>3 Ransomware Defense Strategies</title><link>https://www.sei.cmu.edu/blog/3-ransomware-defense-strategies/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post covers strategies to mitigate RDP attacks &amp; software vulnerabilities, and how to protect against data exfiltration after phishing defense.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Marisa Midler</dc:creator><pubDate>Mon, 09 Nov 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/3-ransomware-defense-strategies/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Ransomware</category></item><item><title>Three Places to Start in Defending Against Ransomware</title><link>https://www.sei.cmu.edu/blog/three-places-to-start-in-defending-against-ransomware/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn three initial efforts for defending against ransomware in this informative SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Timothy Shimeall</dc:creator><pubDate>Mon, 12 Oct 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/three-places-to-start-in-defending-against-ransomware/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Ransomware</category><category>CERT/CC</category></item><item><title>Ransomware as a Service (RaaS) Threats</title><link>https://www.sei.cmu.edu/blog/ransomware-as-a-service-raas-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post explores the economics behind why ransomware remains a top tool for cybercrime and presents the current active ransomware variants that utilize ransomware as a service (RaaS), a change in the ransomware business model that could lead to a significant upswing in ransomware activity.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Marisa Midler</dc:creator><pubDate>Mon, 05 Oct 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/ransomware-as-a-service-raas-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Ransomware</category><category>CERT/CC</category></item><item><title>Ransomware: Best Practices for Prevention and Response</title><link>https://www.sei.cmu.edu/blog/ransomware-best-practices-for-prevention-and-response/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>On May 12, 2017, in the course of a day, the WannaCry ransomware attack infected nearly a quarter million computers. WannaCry is the latest in....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alexander Volynkin, Angela Horneman, José Morales</dc:creator><pubDate>Wed, 31 May 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/ransomware-best-practices-for-prevention-and-response/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Best Practices in Network Security</category><category>Cyber Missions</category><category>Network Situational Awareness</category><category>Ransomware</category><category>Situational Awareness</category></item></channel></rss>