www.securin.io Open in urlscan Pro
18.66.192.112  Public Scan

URL: https://www.securin.io/ransomware-report-2022-q2-q3-download/
Submission: On July 02 via api from OM — Scanned from DE

Form analysis 6 forms found in the DOM

<form>
  <fieldset>
    <legend class="visuallyhidden">Consent Selection</legend>
    <div id="CybotCookiebotDialogBodyFieldsetInnerContainer">
      <div class="CybotCookiebotDialogBodyLevelButtonWrapper"><label class="CybotCookiebotDialogBodyLevelButtonLabel" for="CybotCookiebotDialogBodyLevelButtonNecessary"><strong
            class="CybotCookiebotDialogBodyLevelButtonDescription">Necessary</strong></label>
        <div class="CybotCookiebotDialogBodyLevelButtonSliderWrapper CybotCookiebotDialogBodyLevelButtonSliderWrapperDisabled"><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonNecessary"
            class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelButtonDisabled" disabled="disabled" checked="checked"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></div>
      </div>
      <div class="CybotCookiebotDialogBodyLevelButtonWrapper"><label class="CybotCookiebotDialogBodyLevelButtonLabel" for="CybotCookiebotDialogBodyLevelButtonPreferences"><strong
            class="CybotCookiebotDialogBodyLevelButtonDescription">Preferences</strong></label>
        <div class="CybotCookiebotDialogBodyLevelButtonSliderWrapper"><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonPreferences" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox"
            data-target="CybotCookiebotDialogBodyLevelButtonPreferencesInline" checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></div>
      </div>
      <div class="CybotCookiebotDialogBodyLevelButtonWrapper"><label class="CybotCookiebotDialogBodyLevelButtonLabel" for="CybotCookiebotDialogBodyLevelButtonStatistics"><strong
            class="CybotCookiebotDialogBodyLevelButtonDescription">Statistics</strong></label>
        <div class="CybotCookiebotDialogBodyLevelButtonSliderWrapper"><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonStatistics" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox"
            data-target="CybotCookiebotDialogBodyLevelButtonStatisticsInline" checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></div>
      </div>
      <div class="CybotCookiebotDialogBodyLevelButtonWrapper"><label class="CybotCookiebotDialogBodyLevelButtonLabel" for="CybotCookiebotDialogBodyLevelButtonMarketing"><strong
            class="CybotCookiebotDialogBodyLevelButtonDescription">Marketing</strong></label>
        <div class="CybotCookiebotDialogBodyLevelButtonSliderWrapper"><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonMarketing" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox"
            data-target="CybotCookiebotDialogBodyLevelButtonMarketingInline" checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></div>
      </div>
    </div>
  </fieldset>
</form>

<form><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonNecessaryInline" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelButtonDisabled" disabled="disabled" checked="checked"> <span
    class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>

<form><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonPreferencesInline" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox" data-target="CybotCookiebotDialogBodyLevelButtonPreferences"
    checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>

<form><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonStatisticsInline" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox" data-target="CybotCookiebotDialogBodyLevelButtonStatistics"
    checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>

<form><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonMarketingInline" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox" data-target="CybotCookiebotDialogBodyLevelButtonMarketing" checked="checked"
    tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>

<form class="CybotCookiebotDialogBodyLevelButtonSliderWrapper"><input type="checkbox" id="CybotCookiebotDialogBodyContentCheckboxPersonalInformation" class="CybotCookiebotDialogBodyLevelButton"> <span
    class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>

Text Content

Powered by Cookiebot
 * Consent
 * Details
 * [#IABV2SETTINGS#]
 * About


THIS WEBSITE USES COOKIES

We use cookies to personalise content and ads, to provide social media features
and to analyze our traffic. We also share information about your use of our site
with our social media, advertising and analytics partners who may combine it
with other information that you’ve provided to them or that they’ve collected
from your use of their services.

Consent Selection
Necessary

Preferences

Statistics

Marketing

Show Details
 * Necessary 34
   
   Necessary cookies help make a website usable by enabling basic functions like
   page navigation and access to secure areas of the website. The website cannot
   function properly without these cookies.
    * Airtable
      8
      Learn more about this provider
      __Host-airtable-sessionContains a specific ID for the current session.
      This is necessary for running the website correctly.
      Expiry: 1 yearType: HTTP
      __Host-airtable-session.sigContains a specific ID for the current session.
      This is necessary for running the website correctly.
      Expiry: 1 yearType: HTTP
      AWSALBRegisters which server-cluster is serving the visitor. This is used
      in context with load balancing, in order to optimize user experience.
      Expiry: 6 daysType: HTTP
      AWSALBCORSRegisters which server-cluster is serving the visitor. This is
      used in context with load balancing, in order to optimize user experience.
      Expiry: 6 daysType: HTTP
      AWSALBTGRegisters which server-cluster is serving the visitor. This is
      used in context with load balancing, in order to optimize user experience.
      Expiry: 6 daysType: HTTP
      AWSALBTGCORSRegisters which server-cluster is serving the visitor. This is
      used in context with load balancing, in order to optimize user experience.
      Expiry: 6 daysType: HTTP
      brwDetects and logs potential errors on third-party provided functions on
      the website.
      Expiry: 1 yearType: HTTP
      login-status-pThis cookie is necessary for the login function on the
      website.
      Expiry: SessionType: HTTP
    * Amazon
      1
      Learn more about this provider
      cookies.jsDetermines whether the visitor has accepted the cookie consent
      box. This ensures that the cookie consent box will not be presented again
      upon re-entry.
      Expiry: SessionType: HTTP
    * Cookiebot
      2
      Learn more about this provider
      1.gifUsed to count the number of sessions to the website, necessary for
      optimizing CMP product delivery.
      Expiry: SessionType: Pixel
      CookieConsentStores the user's cookie consent state for the current domain
      Expiry: 1 yearType: HTTP
    * Google
      1
      Learn more about this provider
      _GRECAPTCHAThis cookie is used to distinguish between humans and bots.
      This is beneficial for the website, in order to make valid reports on the
      use of their website.
      Expiry: 179 daysType: HTTP
    * Hubspot
      5
      Learn more about this provider
      rc::aThis cookie is used to distinguish between humans and bots. This is
      beneficial for the website, in order to make valid reports on the use of
      their website.
      Expiry: PersistentType: HTML
      rc::bThis cookie is used to distinguish between humans and bots.
      Expiry: SessionType: HTML
      rc::cThis cookie is used to distinguish between humans and bots.
      Expiry: SessionType: HTML
      rc::d-15#This cookie is used to distinguish between humans and bots.
      Expiry: PersistentType: HTML
      rc::fThis cookie is used to distinguish between humans and bots.
      Expiry: PersistentType: HTML
    * JazzHR
      3
      Learn more about this provider
      AWSELBUsed to distribute traffic to the website on several servers in
      order to optimise response times.
      Expiry: SessionType: HTTP
      AWSELBCORSRegisters which server-cluster is serving the visitor. This is
      used in context with load balancing, in order to optimize user experience.
      Expiry: 0 dayType: HTTP
      SF_PHPSESSIDNecessary for third-party recruitment app.
      Expiry: SessionType: HTTP
    * Zoho
      2
      Learn more about this provider
      _zcsr_tmpThis cookie is necessary for the login function on the website.
      Expiry: SessionType: HTTP
      hex (10)Registers which server-cluster is serving the visitor. This is
      used in context with load balancing, in order to optimize user experience.
      Expiry: SessionType: HTTP
    * hsforms.com
      vimeo.com
      zoominfo.com
      
      9
      __cf_bm [x5]This cookie is used to distinguish between humans and bots.
      This is beneficial for the website, in order to make valid reports on the
      use of their website.
      Expiry: 0 dayType: HTTP
      _cfuvid [x4]This cookie is a part of the services provided by Cloudflare -
      Including load-balancing, deliverance of website content and serving DNS
      connection for website operators.
      Expiry: SessionType: HTTP
    * pagesense-collect.zoho.in
      1
      zfccnEnsures visitor browsing-security by preventing cross-site request
      forgery. This cookie is essential for the security of the website and
      visitor.
      Expiry: SessionType: HTTP
    * www.securin.io
      2
      elementorUsed in context with the website's WordPress theme. The cookie
      allows the website owner to implement or change the website's content in
      real-time.
      Expiry: PersistentType: HTML
      wpEmojiSettingsSupportsThis cookie is part of a bundle of cookies which
      serve the purpose of content delivery and presentation. The cookies keep
      the correct state of font, blog/picture sliders, color themes and other
      website settings.
      Expiry: SessionType: HTML

 * Preferences 2
   
   Preference cookies enable a website to remember information that changes the
   way the website behaves or looks, like your preferred language or the region
   that you are in.
    * Airtable
      1
      Learn more about this provider
      internal/page_viewStores data entered with a form so that when you return
      to the website you don't have to fill in the data again.
      Expiry: SessionType: Pixel
    * Amazon
      1
      Learn more about this provider
      reduxPersistIndexMaintains website settings across multiple visits.
      Expiry: 6 daysType: HTTP

 * Statistics 20
   
   Statistic cookies help website owners to understand how visitors interact
   with websites by collecting and reporting information anonymously.
    * Amazon
      1
      Learn more about this provider
      reduxPersist%3AlocalStorageUsed to implement audio-content from Spotify on
      the website. Can also be used to register user interaction and preferences
      in context with audio-content - This can serve statistics and marketing
      purposes.
      Expiry: 6 daysType: HTTP
    * Google
      5
      Learn more about this provider
      collectUsed to send data to Google Analytics about the visitor's device
      and behavior. Tracks the visitor across devices and marketing channels.
      Expiry: SessionType: Pixel
      _gaRegisters a unique ID that is used to generate statistical data on how
      the visitor uses the website.
      Expiry: 2 yearsType: HTTP
      _ga_#Used by Google Analytics to collect data on the number of times a
      user has visited the website as well as dates for the first and most
      recent visit.
      Expiry: 2 yearsType: HTTP
      _gatUsed by Google Analytics to throttle request rate
      Expiry: 0 dayType: HTTP
      _gidRegisters a unique ID that is used to generate statistical data on how
      the visitor uses the website.
      Expiry: 0 dayType: HTTP
    * Hubspot
      4
      Learn more about this provider
      __hsscIdentifies if the cookie data needs to be updated in the visitor's
      browser.
      Expiry: 0 dayType: HTTP
      __hssrcUsed to recognise the visitor's browser upon reentry on the
      website.
      Expiry: SessionType: HTTP
      __hstcSets a unique ID for the session. This allows the website to obtain
      data on visitor behaviour for statistical purposes.
      Expiry: 179 daysType: HTTP
      hubspotutkSets a unique ID for the session. This allows the website to
      obtain data on visitor behaviour for statistical purposes.
      Expiry: 179 daysType: HTTP
    * Twitter Inc.
      1
      Learn more about this provider
      personalization_idThis cookie is set by Twitter - The cookie allows the
      visitor to share content from the website onto their Twitter profile.
      Expiry: 399 daysType: HTTP
    * Vimeo
      1
      Learn more about this provider
      vuidCollects data on the user's visits to the website, such as which pages
      have been read.
      Expiry: 2 yearsType: HTTP
    * Zoho
      6
      Learn more about this provider
      zps-ft-detailsCollects data on the user’s navigation and behavior on the
      website. This is used to compile statistical reports and heatmaps for the
      website owner.
      Expiry: PersistentType: HTML
      zps-ft-pghitType-detailsCollects data on the user’s navigation and
      behavior on the website. This is used to compile statistical reports and
      heatmaps for the website owner.
      Expiry: PersistentType: HTML
      zabHMBucketCollects data on the user’s navigation and behavior on the
      website. This is used to compile statistical reports and heatmaps for the
      website owner.
      Expiry: 1 yearType: HTTP
      zft-sdcCollects data on the user’s navigation and behavior on the website.
      This is used to compile statistical reports and heatmaps for the website
      owner.
      Expiry: 0 dayType: HTTP
      zsc#Registers data on visitors' website-behaviour. This is used for
      internal analysis and website optimization.
      Expiry: 0 dayType: HTTP
      zabUserIdCollects data on the user’s navigation and behavior on the
      website. This is used to compile statistical reports and heatmaps for the
      website owner.
      Expiry: 1 yearType: HTTP
    * www.securin.io
      2
      ziwsSessionCollects statistics on the user's visits to the website, such
      as the number of visits, average time spent on the website and what pages
      have been read.
      Expiry: SessionType: HTML
      ziwsSessionIdCollects statistics on the user's visits to the website, such
      as the number of visits, average time spent on the website and what pages
      have been read.
      Expiry: SessionType: HTML

 * Marketing 8
   
   Marketing cookies are used to track visitors across websites. The intention
   is to display ads that are relevant and engaging for the individual user and
   thereby more valuable for publishers and third party advertisers.
    * Airtable
      1
      Learn more about this provider
      i/adsctThe cookie is used by Twitter.com in order to determine the number
      of visitors accessing the website through Twitter advertisement content.
      Expiry: SessionType: Pixel
    * Amazon
      1
      Learn more about this provider
      reduxPersist%3AvoiceMessageCreationModalScreenTargets ads based on
      behavioural profiling and geographical location.
      Expiry: 6 daysType: HTTP
    * Hubspot
      1
      Learn more about this provider
      __ptq.gifSends data to the marketing platform Hubspot about the visitor's
      device and behaviour. Tracks the visitor across devices and marketing
      channels.
      Expiry: SessionType: Pixel
    * JazzHR
      1
      Learn more about this provider
      external_referrer_urlRegisters how the user has reached the website to
      enable pay-out of referral commission fees to partners.
      Expiry: 0 dayType: HTTP
    * Spotify
      2
      Learn more about this provider
      anchor-website#keyvaluepairsUsed to implement audio-content from Spotify
      on the website. Can also be used to register user interaction and
      preferences in context with audio-content - This can serve statistics and
      marketing purposes.
      Expiry: PersistentType: IDB
      anchor-website#local-forage-detect-blob-supportUsed to implement
      audio-content from Spotify on the website. Can also be used to register
      user interaction and preferences in context with audio-content - This can
      serve statistics and marketing purposes.
      Expiry: PersistentType: IDB
    * Zoho
      2
      Learn more about this provider
      psimg.gifRegisters a unique ID that identifies the user's device during
      return visits. Used for conversion tracking and to measure the efficacy of
      online ads.
      Expiry: SessionType: Pixel
      zps-tgr-dtsDetermines whether the user is assigned to a specific
      content-experiment to optimize website content and advertisement efforts.
      Expiry: 1 yearType: HTTP

 * Unclassified 13
   Unclassified cookies are cookies that we are in the process of classifying,
   together with the providers of individual cookies.
    * Airtable
      1
      Learn more about this provider
      brwConsentPending
      Expiry: 0 dayType: HTTP
    * Amazon
      2
      Learn more about this provider
      reduxPersist%3AtutorialPending
      Expiry: 6 daysType: HTTP
      sp_tPending
      Expiry: SessionType: HTTP
    * JazzHR
      1
      Learn more about this provider
      internal_navigation_countPending
      Expiry: 0 dayType: HTTP
    * Spotify
      7
      Learn more about this provider
      com.spotify.single.item.cache:anchor-public-websitePending
      Expiry: PersistentType: HTML
      ES|s4p-hosted|EVENT|1|LTIxMTc5MTU1MjI=|DefaultConfigurationAppliedNonAuth|1Pending
      Expiry: PersistentType: HTML
      ES|s4p-hosted|GLOBAL_SEQ_NUMPending
      Expiry: PersistentType: HTML
      ES|s4p-hosted|INSTALLATION_IDPending
      Expiry: PersistentType: HTML
      ES|s4p-hosted|SEQ_NUM|LTIxMTc5MTU1MjI=|DefaultConfigurationAppliedNonAuthPending
      Expiry: PersistentType: HTML
      ES|s4p-hosted|STORAGE_IDPending
      Expiry: PersistentType: HTML
      optimizely-vuidPending
      Expiry: PersistentType: HTML
    * js.zi-scripts.com
      1
      _zitokPending
      Expiry: 1 yearType: HTTP
    * www.securin.io
      1
      unifiedScriptVerifiedPending
      Expiry: SessionType: HTML

Cross-domain consent[#BULK_CONSENT_DOMAINS_COUNT#] [#BULK_CONSENT_TITLE#]
List of domains your consent applies to: [#BULK_CONSENT_DOMAINS#]
Cookie declaration last updated on 10.06.24 by Cookiebot



[#IABV2_TITLE#]

[#IABV2_BODY_INTRO#]
[#IABV2_BODY_LEGITIMATE_INTEREST_INTRO#]
[#IABV2_BODY_PREFERENCE_INTRO#]
[#IABV2_LABEL_PURPOSES#]
[#IABV2_BODY_PURPOSES_INTRO#]
[#IABV2_BODY_PURPOSES#]
[#IABV2_LABEL_FEATURES#]
[#IABV2_BODY_FEATURES_INTRO#]
[#IABV2_BODY_FEATURES#]
[#IABV2_LABEL_PARTNERS#]
[#IABV2_BODY_PARTNERS_INTRO#]
[#IABV2_BODY_PARTNERS#]


Cookies are small text files that can be used by websites to make a user's
experience more efficient.

The law states that we can store cookies on your device if they are strictly
necessary for the operation of this site. For all other types of cookies we need
your permission.

This site uses different types of cookies. Some cookies are placed by third
party services that appear on our pages.

You can at any time change or withdraw your consent from the Cookie Declaration
on our website.

Learn more about who we are, how you can contact us and how we process personal
data in our Privacy Policy.

Please state your consent ID and date when you contact us regarding your
consent.


Do not sell or share my personal information
Deny Allow Selection Customize

Allow All
Powered by Cookiebot by Usercentrics
 * Products
   * Attack Surface Management
   * Vulnerability Intelligence
   
   
   ATTACK SURFACE MANAGEMENT
   
   
   
   Our ASM platform discovers, analyzes, prioritizes, & offers remediation plans
   for exposures in your known & unknown assets.
   
   SIGN-UP FOR ASM
   
   
   
   
   VULNERABILITY INTELLIGENCE
   
   
   
   Our VI platform delivers threat intelligence & context on the latest cyber
   threats providing you with actionable insights for remediation.
   
   REQUEST A DEMO
 * Services
   * Vulnerability Management
   * Penetration Testing
   
   
   VULNERABILITY MANAGEMENT
   
   
   
   Our vulnerability management continually detects, prioritizes, & plans
   remediation to protect your entire IT landscape.
   
   
   
   
   
   PENETRATION TESTING
   
   
   
   Our penetration testing simulates a real-world attack on your digital assets
   to determine the strength of your security & defenses.

 * Use Cases
   * Attack Surface Management
   * Continuous Attack Surface Reduction
   * Discovery of Known & Unknown Assets
   * Assets with Known Ransomware and Exploitable Vulnerabilities
   * Non-Production Systems Exposed to the Public
   * Monitor Subsidiaries & Acquisitions
   * Vulnerability Intelligence
   * Early Warning Risk Alerts
   * Vulnerability Prioritization
   * Tech Stack Alerting
   * Actionable Threat Intelligence
   * Penetration Testing
   * Network & Infrastructure Penetration Testing
   * Meet your Compliance Requirements
   * Test Your Security Resilience
   * Protect Intellectual Property
   * Vulnerability Management
   * Manage Vulnerabilities & Exposures
   * Network & Application Vulnerability Management
   * Threat & Vulnerability Advisories
   * Vulnerability Validation & False Positive Elimination
   Continuous Attack Surface Reduction
   Discovery of Known & Unknown Assets
   Assets with Known Ransomware & Exploitable Vulnerabilities
   Non-Production Systems Exposed to the Public
   Monitor Subsidiaries & Acquisitions
   Manage Vulnerabilities & Exposures
   Network & Application Vulnerability Management
   Threat & Vulnerability Advisories
   Vulnerability Validation & False Positive Elimination
   
   Early Warning Risk Alerts
   Vulnerability Prioritization
   Tech Stack Alerting
   Actionable Threat Intelligence
   Network & Infrastructure Penetration Testing
   Meet your Compliance Requirements
   Test Your Security Resilience
   Protect Intellectual Property
   
   
 * Partners
   * Partner Program
   * Become a Partner
   * Register a Deal
   
   
   PARTNERS
   
   
   
   As a partner led organization, we are committed to working with our partners
   to deliver world-class early warning security intelligence solutions that
   eliminate the adversary advantage & deliver superior security outcomes for
   your clients.
   
   
   Partner Program
   Become a Partner
   Register a Deal
 * Resources
   * Reports
   * Zero Days
   * Articles
   * Patch Watch
   * Webinars & Podcasts
   * Media Coverage
   
   
   RESOURCES
   
   
   Reports
   Zero Days
   Articles
   Patch Watch
   Webinars & Podcasts
   Glossary
   Media Coverage
 * About
   * Overview
   * Careers USA
   
   
   WHO WE ARE
   
   
   Overview
   
   
   
   
   CAREERS
   
   
   USA OPPORTUNITIES


X

Login to Securin
 * Products
   * Attack Surface Management
   * Vulnerability Intelligence
   
   
   ATTACK SURFACE MANAGEMENT
   
   
   
   Our ASM platform discovers, analyzes, prioritizes, & offers remediation plans
   for exposures in your known & unknown assets.
   
   SIGN-UP FOR ASM
   
   
   
   
   VULNERABILITY INTELLIGENCE
   
   
   
   Our VI platform delivers threat intelligence & context on the latest cyber
   threats providing you with actionable insights for remediation.
   
   REQUEST A DEMO
 * Services
   * Vulnerability Management
   * Penetration Testing
   
   
   VULNERABILITY MANAGEMENT
   
   
   
   Our vulnerability management continually detects, prioritizes, & plans
   remediation to protect your entire IT landscape.
   
   
   
   
   
   PENETRATION TESTING
   
   
   
   Our penetration testing simulates a real-world attack on your digital assets
   to determine the strength of your security & defenses.

 * Use Cases
   * Attack Surface Management
   * Continuous Attack Surface Reduction
   * Discovery of Known & Unknown Assets
   * Assets with Known Ransomware and Exploitable Vulnerabilities
   * Non-Production Systems Exposed to the Public
   * Monitor Subsidiaries & Acquisitions
   * Vulnerability Intelligence
   * Early Warning Risk Alerts
   * Vulnerability Prioritization
   * Tech Stack Alerting
   * Actionable Threat Intelligence
   * Penetration Testing
   * Network & Infrastructure Penetration Testing
   * Meet your Compliance Requirements
   * Test Your Security Resilience
   * Protect Intellectual Property
   * Vulnerability Management
   * Manage Vulnerabilities & Exposures
   * Network & Application Vulnerability Management
   * Threat & Vulnerability Advisories
   * Vulnerability Validation & False Positive Elimination
   Continuous Attack Surface Reduction
   Discovery of Known & Unknown Assets
   Assets with Known Ransomware & Exploitable Vulnerabilities
   Non-Production Systems Exposed to the Public
   Monitor Subsidiaries & Acquisitions
   Manage Vulnerabilities & Exposures
   Network & Application Vulnerability Management
   Threat & Vulnerability Advisories
   Vulnerability Validation & False Positive Elimination
   
   Early Warning Risk Alerts
   Vulnerability Prioritization
   Tech Stack Alerting
   Actionable Threat Intelligence
   Network & Infrastructure Penetration Testing
   Meet your Compliance Requirements
   Test Your Security Resilience
   Protect Intellectual Property
   
   
 * Partners
   * Partner Program
   * Become a Partner
   * Register a Deal
   
   
   PARTNERS
   
   
   
   As a partner led organization, we are committed to working with our partners
   to deliver world-class early warning security intelligence solutions that
   eliminate the adversary advantage & deliver superior security outcomes for
   your clients.
   
   
   Partner Program
   Become a Partner
   Register a Deal
 * Resources
   * Reports
   * Zero Days
   * Articles
   * Patch Watch
   * Webinars & Podcasts
   * Media Coverage
   
   
   RESOURCES
   
   
   Reports
   Zero Days
   Articles
   Patch Watch
   Webinars & Podcasts
   Glossary
   Media Coverage
 * About
   * Overview
   * Careers USA
   
   
   WHO WE ARE
   
   
   Overview
   
   
   
   
   CAREERS
   
   
   USA OPPORTUNITIES


X

Login to Securin
 * Products
   * Attack Surface Management
   * Vulnerability Intelligence
   
   
   ATTACK SURFACE MANAGEMENT
   
   
   
   Our ASM platform discovers, analyzes, prioritizes, & offers remediation plans
   for exposures in your known & unknown assets.
   
   SIGN-UP FOR ASM
   
   
   
   
   VULNERABILITY INTELLIGENCE
   
   
   
   Our VI platform delivers threat intelligence & context on the latest cyber
   threats providing you with actionable insights for remediation.
   
   REQUEST A DEMO
 * Services
   * Vulnerability Management
   * Penetration Testing
   
   
   VULNERABILITY MANAGEMENT
   
   
   
   Our vulnerability management continually detects, prioritizes, & plans
   remediation to protect your entire IT landscape.
   
   
   
   
   
   PENETRATION TESTING
   
   
   
   Our penetration testing simulates a real-world attack on your digital assets
   to determine the strength of your security & defenses.

 * Use Cases
   * Attack Surface Management
   * Continuous Attack Surface Reduction
   * Discovery of Known & Unknown Assets
   * Assets with Known Ransomware and Exploitable Vulnerabilities
   * Non-Production Systems Exposed to the Public
   * Monitor Subsidiaries & Acquisitions
   * Vulnerability Intelligence
   * Early Warning Risk Alerts
   * Vulnerability Prioritization
   * Tech Stack Alerting
   * Actionable Threat Intelligence
   * Penetration Testing
   * Network & Infrastructure Penetration Testing
   * Meet your Compliance Requirements
   * Test Your Security Resilience
   * Protect Intellectual Property
   * Vulnerability Management
   * Manage Vulnerabilities & Exposures
   * Network & Application Vulnerability Management
   * Threat & Vulnerability Advisories
   * Vulnerability Validation & False Positive Elimination
   Continuous Attack Surface Reduction
   Discovery of Known & Unknown Assets
   Assets with Known Ransomware & Exploitable Vulnerabilities
   Non-Production Systems Exposed to the Public
   Monitor Subsidiaries & Acquisitions
   Manage Vulnerabilities & Exposures
   Network & Application Vulnerability Management
   Threat & Vulnerability Advisories
   Vulnerability Validation & False Positive Elimination
   
   Early Warning Risk Alerts
   Vulnerability Prioritization
   Tech Stack Alerting
   Actionable Threat Intelligence
   Network & Infrastructure Penetration Testing
   Meet your Compliance Requirements
   Test Your Security Resilience
   Protect Intellectual Property
   
   
 * Partners
   * Partner Program
   * Become a Partner
   * Register a Deal
   
   
   PARTNERS
   
   
   
   As a partner led organization, we are committed to working with our partners
   to deliver world-class early warning security intelligence solutions that
   eliminate the adversary advantage & deliver superior security outcomes for
   your clients.
   
   
   Partner Program
   Become a Partner
   Register a Deal
 * Resources
   * Reports
   * Zero Days
   * Articles
   * Patch Watch
   * Webinars & Podcasts
   * Media Coverage
   
   
   RESOURCES
   
   
   Reports
   Zero Days
   Articles
   Patch Watch
   Webinars & Podcasts
   Glossary
   Media Coverage
 * About
   * Overview
   * Careers USA
   
   
   WHO WE ARE
   
   
   Overview
   
   
   
   
   CAREERS
   
   
   USA OPPORTUNITIES


X

Login to Securin
 * Products
   * Attack Surface Management
   * Vulnerability Intelligence
   
   
   ATTACK SURFACE MANAGEMENT
   
   
   
   Our ASM platform discovers, analyzes, prioritizes, & offers remediation plans
   for exposures in your known & unknown assets.
   
   SIGN-UP FOR ASM
   
   
   
   
   VULNERABILITY INTELLIGENCE
   
   
   
   Our VI platform delivers threat intelligence & context on the latest cyber
   threats providing you with actionable insights for remediation.
   
   REQUEST A DEMO
 * Services
   * Vulnerability Management
   * Penetration Testing
   
   
   VULNERABILITY MANAGEMENT
   
   
   
   Our vulnerability management continually detects, prioritizes, & plans
   remediation to protect your entire IT landscape.
   
   
   
   
   
   PENETRATION TESTING
   
   
   
   Our penetration testing simulates a real-world attack on your digital assets
   to determine the strength of your security & defenses.

 * Use Cases
   * Attack Surface Management
   * Continuous Attack Surface Reduction
   * Discovery of Known & Unknown Assets
   * Assets with Known Ransomware and Exploitable Vulnerabilities
   * Non-Production Systems Exposed to the Public
   * Monitor Subsidiaries & Acquisitions
   * Vulnerability Intelligence
   * Early Warning Risk Alerts
   * Vulnerability Prioritization
   * Tech Stack Alerting
   * Actionable Threat Intelligence
   * Penetration Testing
   * Network & Infrastructure Penetration Testing
   * Meet your Compliance Requirements
   * Test Your Security Resilience
   * Protect Intellectual Property
   * Vulnerability Management
   * Manage Vulnerabilities & Exposures
   * Network & Application Vulnerability Management
   * Threat & Vulnerability Advisories
   * Vulnerability Validation & False Positive Elimination
   Continuous Attack Surface Reduction
   Discovery of Known & Unknown Assets
   Assets with Known Ransomware & Exploitable Vulnerabilities
   Non-Production Systems Exposed to the Public
   Monitor Subsidiaries & Acquisitions
   Manage Vulnerabilities & Exposures
   Network & Application Vulnerability Management
   Threat & Vulnerability Advisories
   Vulnerability Validation & False Positive Elimination
   
   Early Warning Risk Alerts
   Vulnerability Prioritization
   Tech Stack Alerting
   Actionable Threat Intelligence
   Network & Infrastructure Penetration Testing
   Meet your Compliance Requirements
   Test Your Security Resilience
   Protect Intellectual Property
   
   
 * Partners
   * Partner Program
   * Become a Partner
   * Register a Deal
   
   
   PARTNERS
   
   
   
   As a partner led organization, we are committed to working with our partners
   to deliver world-class early warning security intelligence solutions that
   eliminate the adversary advantage & deliver superior security outcomes for
   your clients.
   
   
   Partner Program
   Become a Partner
   Register a Deal
 * Resources
   * Reports
   * Zero Days
   * Articles
   * Patch Watch
   * Webinars & Podcasts
   * Media Coverage
   
   
   RESOURCES
   
   
   Reports
   Zero Days
   Articles
   Patch Watch
   Webinars & Podcasts
   Glossary
   Media Coverage
 * About
   * Overview
   * Careers USA
   
   
   WHO WE ARE
   
   
   Overview
   
   
   
   
   CAREERS
   
   
   USA OPPORTUNITIES


X

Login to Securin


RANSOMWARE REPORT 2022 Q2 & Q3



The Ransomware Index Update for Q2 & Q3 2022 provides an update on the number of
vulnerabilities that are being exploited by ransomware operators and also
provides an in-depth look into the MITRE ATT&CK tactics and techniques for each
vulnerability. 

This edition of the report features:

 * Ransomware Vulnerabilities that are not detected by scanners
 * IoCs for new ransomware groups in Q2 & Q3 2022
 * Top vulnerabilities that could be exploited in the future
 * List of ransomware vulnerabilities that are not present in CISA KEV






RANSOMWARE REPORT 2022 Q2 & Q3



The Ransomware Index Update for Q2 & Q3 2022 provides an update on the number of
vulnerabilities that are being exploited by ransomware operators and also
provides an in-depth look into the MITRE ATT&CK tactics and techniques for each
vulnerability.



This edition of the report features:

 * Ransomware Vulnerabilities that are not detected by scanners
 * IoCs for new ransomware groups in Q2 & Q3 2022
 * Top vulnerabilities that could be exploited in the future
 * List of ransomware vulnerabilities that are not present in CISA KEV




Securin helps leaders continuously improve their security posture. We work as an
extension of your team to better protect your organization.

 * Privacy Policy | Customer Agreements

CONTACT

 * 2440 Louisiana Blvd NE #560, Albuquerque, NM 87110
 * 505-302-1113
 * info@securin.io

SECURITY SOLUTIONS

 * Attack Surface Management
 * Vulnerability Intelligence
 * Vulnerability Management
 * Penetration Testing

RESOURCE CENTER

 * Zero Days
 * Articles
 * Patch Watch

 * 
 * 
 * 
 * 
 * 

© Copyright 2024 Securin All Rights Reserved
14210