In-Depth Analysis and Countermeasures for Ransomware Attacks: Case Studies and Recommendations
Yap Jia Seng,
No information about this author
Teo Yue Cen,
No information about this author
Muhammad Amar Hakim bin Mohd Raslan
No information about this author
et al.
Published: Sept. 2, 2024
Ransomware,
a
combination
of
"ransom"
and
"malware,"
is
type
malicious
software
designed
to
encrypt
or
block
access
victim's
data
system,
demanding
ransom
for
its
release
Initially
targeting
individuals,
ransomware
has
evolved
attack
businesses
greater
financial
gain.
It
mainly
exists
in
two
forms:
encrypting
ransomware,
which
holds
hostage,
non-encrypting
blocks
system
displays
note.
The
energy
sector
been
notably
targeted
by
exemplified
the
2021
on
Colonial
Pipeline
DarkSide
group,
led
temporary
shutdown
significant
fuel
shortage
US
East
Coast.
Similarly,
2023,
Russian
hackers
using
LockBit
disrupted
Royal
Mail,
halting
international
deliveries
incurring
millions
recovery
costs
despite
no
payment.
These
incidents
underscore
need
comprehensive
cybersecurity
strategies
that
combine
human
vigilance
with
advanced
technologies
like
AI
machine
learning.
By
adopting
multi-layered
protection
approach,
organizations
can
better
prepare
mitigate
risks
posed
attacks
safeguarding
sensitive
ensuring
business
continuity.
Language: Английский
AI in Healthcare Safeguarding Patient Privacy and Confidentiality
Advances in information security, privacy, and ethics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 369 - 404
Published: Feb. 14, 2025
In
the
era
of
digitization,
Artificial
Intelligence
(AI)
integration
in
healthcare
has
become
a
necessity
to
ensure
patient
identification
&
privacy.
With
rise
digitalisation
health
systems,
it
also
increasingly
important
have
more
stringent
data
protection
requirements.
This
transformation
is
heavily
facilitated
by
AI-driven
technologies
that
reinforce
security,
identify
real-time
threats
and
streamline
compliance
with
regulations.
By
utilizing
Machine
Learning
(ML)
algorithms
comb
through
big
data,
outliers
can
be
pinpointed
filtered
out
so
unauthorized
access
prevented
assistance
advanced
forms
encryption
which
protect
information
while
transit
or
at
rest.
But
fast
pace
AI
development
creates
as
many
opportunities
challenges,
especially
when
comes
marrying
availability
These
ethical
concerns,
for
effective
regulatory
frameworks,
are
critical
an
evolving
ecosystem
technologies.
Language: Английский
Progress and Obstacles in Cloud Computing for Healthcare
Abu Jor Al Gefari,
No information about this author
Imran Hasan,
No information about this author
Md Amin Ullah Sheikh
No information about this author
et al.
Advances in information security, privacy, and ethics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 347 - 368
Published: Feb. 14, 2025
Since
the
invention
of
Internet
Things
(IoT),
people
are
seeing
a
new
world
in
healthcare.
The
rapid
growth
IoT
has
brought
with
it
solutions
to
dilemmas
and
few
challenges
cloud
devices.
But
keeping
mind
benefits
these
devices,
need
be
solved
efficiency
security.
Putting
place
storage
analysis
for
specific
periods
is
very
popular
medicine.
On
other
hand,
creating
big
data,
considering
sensitivity,
some
limitations
have
accepted.
use
latency,
throughput,
bandwidth
increases
cost
Internet.
Numerous
alternative
paradigms,
most
notably
edge
computing
fog
computing,
evolved
solve
shortcomings.
Consequently,
studies
shown
an
increase
hybrid
based.
Language: Английский
Future Trends in AI Security
Advances in information security, privacy, and ethics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 229 - 262
Published: Feb. 14, 2025
Cybersecurity
is
enriched
due
to
Artificial
Intelligence
(AI),
which
provides
better
real-time
threat
detection
and
anomaly
identification,
response
systems.
As
attackers
grow
more
sophisticated
leverage
AI
in
creating
malware.
The
present
study
gives
an
overview
of
the
future
threats
associated
with
AI-driven
attacks
challenges
faced
by
existing
cybersecurity
countermeasures.
Additionally,
it
also
analyses
feasibility
using
capabilities
like
predictive
intelligence,
advanced
quantum
computing
for
some
these
emerging
threats.
For
such
as,
we
need
user
permissions
rights
on
this
application,
should
take
into
consideration
privacy
policies
while
designing
security
as
well.
To
end,
get
ready
against
risks
a
proactive
adaptive
approach
needed
stressing
collaboration
between
industry,
academia
well
global
entities.
Language: Английский
Blockchain in Cybersecurity Enhancing Data Integrity and Transaction Security
Advances in information security, privacy, and ethics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 1 - 40
Published: Feb. 14, 2025
The
technology
is
becoming
a
little
more
widely
known
with
its
data
security
and
hyper-transaction
reliability.
By
very
design
of
decentralization
implementation
cryptographic
principles
to
maintain
integrity,
blockchain
eliminates
central
points
failure
making
tampering
unauthorized
changes
virtually
impossible
as
well.
This
part
the
diary
will
discuss
how
giving
our
financial
transactions,
providing
safety
identities
agreements
seamless
smart
contracts.
From
healthcare
supply
chain
management,
it
amazing
witness
many
industries
are
beginning
incorporate
decree
validity
information,
prevent
fraud.
But
you
know
what
they
say
—
new
tech
has
ways
break.
ride
been
accompanied
by
scalability
challenges,
energy
consumption
worries,
regulation
problems
so
on.
There
also
some
promising
prospects,
quantum-resistant
algorithms
enhanced
interoperability
may
resolve
these
widen
blockchain's
influence.
Language: Английский
Cybersecurity in IoT Ecosystems Managing Device Vulnerabilities and Data Exposure
Advances in information security, privacy, and ethics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 63 - 98
Published: Feb. 14, 2025
The
proliferation
of
IoT
devices
and
sensors
leads
to
greater
efficiency
but
also
greatly
increased
attack
surfaces.
In
this
part
the
series,
we
delve
into
some
key
security
issues
that
plague
ecosystems
with
a
solution-
understanding
device
vulnerabilities
how
they
led
data
exposure.
are
frequently
built
without
strong
defences
in
place,
lack
secure
firmware
combined
weak
authentication
making
them
top
list
for
attackers.
We
will
turn
real-world
threats,
such
as
distributed
denial
service
(DDoS)
attacks
launched
by
botnets
breaches
disclose
personal
information
or
sensitive
business
information.
Although
chapter
certainly
warns
risks,
it
is
no
means
doom-and-gloom
line
reasoning.
paper
outlines
best
practices
systems,
from
security-by-design
principles
leveraging
AI
blockchain
technologies.
Language: Английский
Current Security Issues and Vulnerabilities Associated With Mobile Application
Abdullahi Adewole Zakariyah,
No information about this author
Muhammand Intizar Ali,
No information about this author
Nima Yoezer
No information about this author
et al.
Advances in information security, privacy, and ethics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 41 - 62
Published: Feb. 14, 2025
Mobile
applications
have
become
a
crucial
part
of
modern
life,
facilitating
everything
from
social
interactions
to
financial
transactions.
However,
this
ubiquity
also
presents
significant
security
challenge.
The
landscape
mobile
app
is
fraught
with
vulnerabilities
and
threats
that
can
compromise
user
data,
privacy,
the
overall
integrity
applications.
This
paper
delves
into
issues
affect
It
provides
an
in-depth
analysis
various
attack
methods
used
by
cybercriminals
extract
data
explores
how
users
protect
their
information
being
compromised.
discussion
will
cover
common
tactics
employed
attackers,
potential
consequences
losing
application
these
threats,
critical
measures
necessary
for
safeguarding
against
such
attacks.
Language: Английский
AI-Powered Behavioral Analysis for Early Detection of Ransomware in Cybersecurity Environments
Udit Mamodiya,
No information about this author
K. Ravali,
No information about this author
Srinu Banothu
No information about this author
et al.
Advances in information security, privacy, and ethics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 95 - 108
Published: Feb. 7, 2025
Ransomware
attacks
are
one
of
the
most
wide-ranging
and
destructive
types
threat
in
modern
cybersecurity
pose
threats
to
organizations,
enterprises,
individuals.
These
traditional
signature-based
heuristic
methods
detecting
security
systems
do
not
discover
new
polymorphic
ransomware
variants
due
their
adaptive
behavior
towards
avoiding
being
detected.
In
an
attempt
overcome
these
limitations,
this
paper
proposes
AI-powered
behavioral
analysis
framework
for
early
detection
environments.
The
proposed
system
uses
advanced
machine
learning
deep
techniques
identify
anomalous
patterns
at
various
levels
system,
such
as
file
access,
process
execution,
network
activity.
It
incorporates
both
a
Long
Short-Term
Memory
(LSTM)
model
sequential
data
Random
Forest
(RF)
classifier
extract
features
classify
ransomware.
Language: Английский