Ransomware & Cybercrime

Ransomware & Cybercrime is the second book written by Andy Jenkinson, Group CEO of Cybersec Innovation Partners, a Fellow of The Cyber Theory Institute and who was voted in 2022 by The European Institute of Risk, as one of the 30 Leading Global experts.

This book provides the reader with compelling evidence of how most of the Digital Intrusions and cyber attacks occur. 

The author is a specialist in the Public Key Infrastructure and Domain Name System areas of security. These areas are often taken for granted, overlooked, and misunderstood.

Ransomware & Cybercrime follows on from the first best-selling book by the author, titled Stuxnet to Sunburst, 20 years of Digital Exploitation. A third book already in manuscript form titled; Digital Blood on Their Hands is an expose which includes deep insights into the Cyberwar that was the precursor to the Invasion by Russia into Ukraine.

Ransomware and Cybercrime was written following extensive research of over one thousand cyberattacks over the last three years. It includes SolarWinds, Travelex, CNA Insurance, Colonial Pipeline, Oldsmar, easyJet and many others.

The book goes into some depth of how, in 2018 HTTP was superseded and replaced with HTTPS, the S standing for Secure. It covers the developments and advancement of Open-Source Intelligence (OSINT) and how the two combined, perversely made it easier to not only identify exposed and exploitable Internet positions, but also how to gain Access into company’s networks and enterprises to exploit them.

Ransomware & Cybercrime demonstrates how cyber attacks, in all forms, Intellectual Property theft, Personable Identifiable Information theft, Living off the Land, Man in The Middle Attacks, Water Hole Attacks, Code Injection and many more all require one thing – ACCESS and how that is being achieved.

Much of Andy Jenkinson’s work has subsequently found audience and replication by government agencies, The White House and EU Commission who are now addressing DNS abuse and attacks. The year 2018 will go down in history as being the year that simple identification of Not Secure domains, subdomains and DNS positions made a cyber criminals reconnaissance even simpler than before, and then to exploit knowing controls are lax. 

The book evidences how domain numbers over the last 20 years are directly aligned with the increase in cybercrime, there is a direct correlation between the upward trends.  

Ransomware & Cybercrime concludes that cyber criminals are Not Sophisticated, as everybody is led to believe. They do not need to understand PKI or DNS, they simply exploit the fact their victims do not. All they need to know is how to identify exposed, Insecure and Not Secure Domains, PKI and DNS positions to launch readily available attacks which result in Ransomware & Cybercrime.
 

« Data Breaches & Identity Theft: Is Your Online Classroom Secure?
Warning: Chinese Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYBERPOL

CYBERPOL

CYBERPOL is the leading Public Utility Agency for investigating cyber crimes and cyber attacks by criminals, international adversaries.

Kaymera Technologies

Kaymera Technologies

Kaymera’s comprehensive mobile enterprise security solution defends against all mobile threat and attack vectors.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

SparkLabs Cyber + Blockchain

SparkLabs Cyber + Blockchain

SparkLabs Cyber + Blockchain accelerator is located in Washington D.C. which is one of the world's top cybersecurity ecosystems.

PurpleSynapz

PurpleSynapz

PurpleSynapz provides hyper-realistic Cyber Security Training with a modern curriculum and Cyber Range.

Newtec Services

Newtec Services

IT should be responsive, adaptive, and smart. Now more than ever, you need a business that runs efficiently and can adapt to today's challenges. We can help with custom IT solutions.

Octiga

Octiga

Octiga is an office 365 cloud security provider. It offers Office 365 monitoring, incident response and recovery tools.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

Nexon Asia Pacific

Nexon Asia Pacific

Nexon solutions include cloud infrastructure and services, unified communications, managed security services, business continuity, secured high-performance network and business applications.

Binarly

Binarly

Binarly is a global firmware and software supply chain security company founded in 2021.

AVEVA

AVEVA

AVEVA has a long history in providing Supervisory Control and Data Acquisition software for meeting complex and evolving automation requirements.

WPScan

WPScan

With WPScan, you'll be the first to know about vulnerabilities affecting your WordPress installation, plugins, and themes.

ScamAdvisor

ScamAdvisor

ScamAdviser helps over 3 million consumers every month to discover if a website is legitimate or a possible scam.

Neeve

Neeve

Neeve is an edge cloud platform transforming smart buildings and spaces, making them more secure, smarter, and more sustainable.

CIS Secure

CIS Secure

CIS Secure is an innovator, integrator and expert advisor supporting the broadest portfolio of powerful, mission-specific C5ISR communications and cybersecurity solutions.