Ransomware & Cybercrime

Ransomware & Cybercrime is the second book written by Andy Jenkinson, Group CEO of Cybersec Innovation Partners, a Fellow of The Cyber Theory Institute and who was voted in 2022 by The European Institute of Risk, as one of the 30 Leading Global experts.

This book provides the reader with compelling evidence of how most of the Digital Intrusions and cyber attacks occur. 

The author is a specialist in the Public Key Infrastructure and Domain Name System areas of security. These areas are often taken for granted, overlooked, and misunderstood.

Ransomware & Cybercrime follows on from the first best-selling book by the author, titled Stuxnet to Sunburst, 20 years of Digital Exploitation. A third book already in manuscript form titled; Digital Blood on Their Hands is an expose which includes deep insights into the Cyberwar that was the precursor to the Invasion by Russia into Ukraine.

Ransomware and Cybercrime was written following extensive research of over one thousand cyberattacks over the last three years. It includes SolarWinds, Travelex, CNA Insurance, Colonial Pipeline, Oldsmar, easyJet and many others.

The book goes into some depth of how, in 2018 HTTP was superseded and replaced with HTTPS, the S standing for Secure. It covers the developments and advancement of Open-Source Intelligence (OSINT) and how the two combined, perversely made it easier to not only identify exposed and exploitable Internet positions, but also how to gain Access into company’s networks and enterprises to exploit them.

Ransomware & Cybercrime demonstrates how cyber attacks, in all forms, Intellectual Property theft, Personable Identifiable Information theft, Living off the Land, Man in The Middle Attacks, Water Hole Attacks, Code Injection and many more all require one thing – ACCESS and how that is being achieved.

Much of Andy Jenkinson’s work has subsequently found audience and replication by government agencies, The White House and EU Commission who are now addressing DNS abuse and attacks. The year 2018 will go down in history as being the year that simple identification of Not Secure domains, subdomains and DNS positions made a cyber criminals reconnaissance even simpler than before, and then to exploit knowing controls are lax. 

The book evidences how domain numbers over the last 20 years are directly aligned with the increase in cybercrime, there is a direct correlation between the upward trends.  

Ransomware & Cybercrime concludes that cyber criminals are Not Sophisticated, as everybody is led to believe. They do not need to understand PKI or DNS, they simply exploit the fact their victims do not. All they need to know is how to identify exposed, Insecure and Not Secure Domains, PKI and DNS positions to launch readily available attacks which result in Ransomware & Cybercrime.
 

« Data Breaches & Identity Theft: Is Your Online Classroom Secure?
Warning: Chinese Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ECSC Group

ECSC Group

ECSC is a full-service information security provider, specialising in 24/7/365 security breach detection and Artificial Intelligence (AI).

Axial

Axial

Axial Systems is one of the UK’s leading solution providers and systems integrators in network, security and services.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

Data Resolve Technologies

Data Resolve Technologies

Data Resolve offer a mechanism through which customers can detect and tackle various kinds of sensitive activities pertaining to data loss and data theft.

Perception Point

Perception Point

Perception Point is a Prevention-as-a-Service company, built to enable digital transformation. Our platform offers 360-degree protection against any type of content-based attack.

Wizlynx Group

Wizlynx Group

Wizlynx services cover the entire risk management lifecycle from security assessments and compliance to the implementation of security solutions and provision of Managed Security Services.

Netsafe

Netsafe

Netsafe is an independent, non-profit New Zealand organisation focused on online safety. We help people stay safe online by providing online safety education, advice and support.

Department of Justice - Office of Cybercrime (DOJ-OOC)

Department of Justice - Office of Cybercrime (DOJ-OOC)

The Office of Cybercrime within the Philippines Department of Justice is the Central Authority in all matters relating to international mutual assistance and extradition for cybercrime.

Greensafe IT

Greensafe IT

Greensafe offer various onsite and offsite data erasure services, aimed at increasing data security whilst reducing any risk of data loss during transit.

BwCIRT

BwCIRT

BwCIRT is the Computer Incident Response Team (CIRT) for Botswana and provides an official point of contact for dealing with computer security incidents.

CONCORDIA

CONCORDIA

Concordia is a Cybersecurity Competence Network with leading research, technology, and competences to build the European Secure, Resilient and Trusted Ecosystem.

SecureWorx

SecureWorx

SecureWorx are a secure multi-cloud MSP, a provider of advanced IT security services and an independent cyber security advisory.

Ofcom

Ofcom

Ofcom is the UK's communications regulator. We regulate the TV, radio and video on demand sectors, fixed line telecoms, mobiles, postal services, plus the airwaves over which wireless devices operate.

Proton

Proton

Proton provides free encrypted email, calendar, drive, password manager, and VPN services. Building a better Internet.

Cysmo Cyber Risk

Cysmo Cyber Risk

Cysmo is an innovative cyber risk assessment platform specifically designed for the needs of the German insurance industry.