Ransomware & Cybercrime

Ransomware & Cybercrime is the second book written by Andy Jenkinson, Group CEO of Cybersec Innovation Partners, a Fellow of The Cyber Theory Institute and who was voted in 2022 by The European Institute of Risk, as one of the 30 Leading Global experts.

This book provides the reader with compelling evidence of how most of the Digital Intrusions and cyber attacks occur. 

The author is a specialist in the Public Key Infrastructure and Domain Name System areas of security. These areas are often taken for granted, overlooked, and misunderstood.

Ransomware & Cybercrime follows on from the first best-selling book by the author, titled Stuxnet to Sunburst, 20 years of Digital Exploitation. A third book already in manuscript form titled; Digital Blood on Their Hands is an expose which includes deep insights into the Cyberwar that was the precursor to the Invasion by Russia into Ukraine.

Ransomware and Cybercrime was written following extensive research of over one thousand cyberattacks over the last three years. It includes SolarWinds, Travelex, CNA Insurance, Colonial Pipeline, Oldsmar, easyJet and many others.

The book goes into some depth of how, in 2018 HTTP was superseded and replaced with HTTPS, the S standing for Secure. It covers the developments and advancement of Open-Source Intelligence (OSINT) and how the two combined, perversely made it easier to not only identify exposed and exploitable Internet positions, but also how to gain Access into company’s networks and enterprises to exploit them.

Ransomware & Cybercrime demonstrates how cyber attacks, in all forms, Intellectual Property theft, Personable Identifiable Information theft, Living off the Land, Man in The Middle Attacks, Water Hole Attacks, Code Injection and many more all require one thing – ACCESS and how that is being achieved.

Much of Andy Jenkinson’s work has subsequently found audience and replication by government agencies, The White House and EU Commission who are now addressing DNS abuse and attacks. The year 2018 will go down in history as being the year that simple identification of Not Secure domains, subdomains and DNS positions made a cyber criminals reconnaissance even simpler than before, and then to exploit knowing controls are lax. 

The book evidences how domain numbers over the last 20 years are directly aligned with the increase in cybercrime, there is a direct correlation between the upward trends.  

Ransomware & Cybercrime concludes that cyber criminals are Not Sophisticated, as everybody is led to believe. They do not need to understand PKI or DNS, they simply exploit the fact their victims do not. All they need to know is how to identify exposed, Insecure and Not Secure Domains, PKI and DNS positions to launch readily available attacks which result in Ransomware & Cybercrime.
 

« Data Breaches & Identity Theft: Is Your Online Classroom Secure?
Warning: Chinese Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CloudEndure

CloudEndure

CloudEndure offers Disaster Recovery and Continuous Replication for the Cloud.

Surrey Centre for Cyber Security (SCCS)

Surrey Centre for Cyber Security (SCCS)

The Centre focuses on three main research directions - Privacy and Data Protection, Secure Communications, and Human-Centred Security.

Cryptomathic

Cryptomathic

Cryptomathic is an expert on commercial crypto - we develop, deliver and support the most secure and efficient off-the-shelf and customised solutions.

Gilbert + Tobin

Gilbert + Tobin

Gilbert + Tobin is an Australian corporate law firm serving clients throughout Australia, and around the world, on a broad range of legal issues including cyber security.

CYSEC NG

CYSEC NG

Cyber Security Challenge Nigeria Initiative (CYSEC NG) is the first, and largest offensive premier Cyber Conference and Hacking event in Africa.

Uhuru Corp

Uhuru Corp

Uhuru offers a wide variety of IoT products and solutions including enebular® IoT Orchestration Service.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

SnapAttack

SnapAttack

SnapAttack is a collaborative platform that empowers your security team to stay ahead of threats, create robust behavioral analytics for your existing tools, and prove your program's effectiveness.

CyberCatch

CyberCatch

CyberCatch provides an innovative cybersecurity Software-as-a-Service (SaaS) platform designed for SMBs.

Nitel

Nitel

Nitel is a leading next-generation technology services provider. We simplify the complex technology challenges of today’s enterprises to create seamless and integrated managed network solutions.

Quarkslab

Quarkslab

Quarkslab is a dedicated team of cyber-security engineers and developers. We aim at forcing the attackers, not the defender, to adapt constantly.

Kivera

Kivera

Kivera enforces your organisation governance and security policies across cloud deployments preventing misconfigurations turning into attack vectors.

Cyrex

Cyrex

Cyrex is a Web3 security and development company. Our mastery over decentralized applications, smart contracts and blockchain will keep you secure across Web3.

Alpha Echo

Alpha Echo

Specialising in security advice and enterprise-wide Cyberworthiness, Alpha Echo helps Australia deliver on cyber outcomes at a military grade level.