Ransomware & Cybercrime

Ransomware & Cybercrime is the second book written by Andy Jenkinson, Group CEO of Cybersec Innovation Partners, a Fellow of The Cyber Theory Institute and who was voted in 2022 by The European Institute of Risk, as one of the 30 Leading Global experts.

This book provides the reader with compelling evidence of how most of the Digital Intrusions and cyber attacks occur. 

The author is a specialist in the Public Key Infrastructure and Domain Name System areas of security. These areas are often taken for granted, overlooked, and misunderstood.

Ransomware & Cybercrime follows on from the first best-selling book by the author, titled Stuxnet to Sunburst, 20 years of Digital Exploitation. A third book already in manuscript form titled; Digital Blood on Their Hands is an expose which includes deep insights into the Cyberwar that was the precursor to the Invasion by Russia into Ukraine.

Ransomware and Cybercrime was written following extensive research of over one thousand cyberattacks over the last three years. It includes SolarWinds, Travelex, CNA Insurance, Colonial Pipeline, Oldsmar, easyJet and many others.

The book goes into some depth of how, in 2018 HTTP was superseded and replaced with HTTPS, the S standing for Secure. It covers the developments and advancement of Open-Source Intelligence (OSINT) and how the two combined, perversely made it easier to not only identify exposed and exploitable Internet positions, but also how to gain Access into company’s networks and enterprises to exploit them.

Ransomware & Cybercrime demonstrates how cyber attacks, in all forms, Intellectual Property theft, Personable Identifiable Information theft, Living off the Land, Man in The Middle Attacks, Water Hole Attacks, Code Injection and many more all require one thing – ACCESS and how that is being achieved.

Much of Andy Jenkinson’s work has subsequently found audience and replication by government agencies, The White House and EU Commission who are now addressing DNS abuse and attacks. The year 2018 will go down in history as being the year that simple identification of Not Secure domains, subdomains and DNS positions made a cyber criminals reconnaissance even simpler than before, and then to exploit knowing controls are lax. 

The book evidences how domain numbers over the last 20 years are directly aligned with the increase in cybercrime, there is a direct correlation between the upward trends.  

Ransomware & Cybercrime concludes that cyber criminals are Not Sophisticated, as everybody is led to believe. They do not need to understand PKI or DNS, they simply exploit the fact their victims do not. All they need to know is how to identify exposed, Insecure and Not Secure Domains, PKI and DNS positions to launch readily available attacks which result in Ransomware & Cybercrime.
 

« Data Breaches & Identity Theft: Is Your Online Classroom Secure?
Warning: Chinese Cyber Attacks »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

Virtual Security

Virtual Security

Virtual Security provides solutions in the field of managed security services, network security, secure remote work, responsible internet, application security, encryption, BYOD and compliance.

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

Efecte

Efecte

Efecte is a Nordic SaaS company specialized in IT Service Management, Self-Service, Identity Management and Access Governance solutions.

ISC2

ISC2

ISC2 is an international, non-profit membership association for information security leaders. Our information security certifications are recognized as the global standard for excellence.

SecureMetric Technology

SecureMetric Technology

SecureMetric is one of SE Asia’s leading players in the field of digital security with a focus on Software Licensing Protection, 2-Factor Authentication, Advanced Identity and Access Management, Publi

Netsecurity AS

Netsecurity AS

Netsecurity is a Norwegian owned company focused and specialised within IT security and cybersecurity-as-a service.

Simply Hired

Simply Hired

Simply Hired is a job search engine that collects job listings from all over the web, including company career pages, job boards and niche job websites.

Zacco

Zacco

Zacco offer a 360° perspective on intellectual property: From patent filing and trademark registration to software development, digital brand protection, cyber security and portfolio management.

MazeBolt Technologies

MazeBolt Technologies

Israel-based MazeBolt is an innovation leader in cybersecurity, with over two decades of experience in pioneering DDoS protection solutions.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

Unisys

Unisys

Unisys is a global information technology company providing industry-focused solutions integrated with leading-edge security to clients in the government, financial services and commercial markets.

Olympix

Olympix

Dev-first Web3 security that starts at the source. Olympix is a pioneering DevSecOps tool that puts security in the hands of the developer by proactively securing code from day one.

Dotsquares

Dotsquares

Dotsquares leverage the latest web and mobile technologies to build, grow and support your business.

Skillfield

Skillfield

Skillfield is a Melbourne based Cyber Security and Data Services consultancy and professional services company.

Adaptive Security

Adaptive Security

Adaptive is a next-generation cybersecurity platform. We're working with pioneering security teams to protect critical systems from AI-powered cyber attacks.