New! CNAPP That Helps You Think Like an Attacker with Singularity Cloud Native Security.
Learn More
New! Singularity™ Cloud Native Security
Experiencing a Breach?
Small Business
Contact
Cybersecurity Blog
en
English
日本語
Deutsch
Español
Français
Italiano
Dutch
한국어
Platform
Platform Overview
Singularity Platform
Welcome to Integrated
Enterprise Security
How It Works
The Singularity XDR Difference
Singularity Marketplace
One-Click Integrations to Unlock the Power of XDR
Pricing & Packaging
Comparisons and Guidance at a Glance
Data & AI
Purple AI
Accelerate SecOps with Generative AI
Singularity Data Lake
AI-Powered, Unified
Data Lake
Singularity Data Lake for Log Analytics
Seamlessly ingest data
from on-prem, cloud or hybrid environments
Endpoint Security
Singularity Endpoint
Autonomous Prevention, Detection, and Response
Singularity XDR
Native & Open Protection, Detection, and Response
Singularity RemoteOps Forensics
Orchestrate Forensics at Scale
Singularity
Threat Intelligence
Comprehensive Adversary Intelligence
Singularity Vulnerability Management
Application & Os Vulnerability Management
Cloud Security
Singularity Cloud Security
Block Attacks With an
AI-powered CNAPP
Singularity Cloud
Native Security
Secure Cloud and Development Resources
Singularity Cloud Workload Security
Real-Time Cloud Workload Protection Platform
Singularity
Cloud Data Security
AI-Powered Threat Detection for Cloud Storage
Identity Security
Singularity Identity
Identity Threat Detection
and Response
Singularity Hologram
Deception Protection
Why SentinelOne?
Why SentinelOne?
Why SentinelOne?
Cybersecurity Built
for What’s Next
Our Customers
Trusted by the World’s Leading Enterprises
Industry Recognition
Tested and Proven
by the Experts
About Us
The Industry Leader in Autonomous Cybersecurity
Compare SentinelOne
CrowdStrike
Cyber Dependent
on a Crowd
McAfee
Pale Performance,
More Maintenance
Microsoft
Platform Coverage
That Compromises
Trend Micro
The Risk of DevOps Disruption
Palo Alto Networks
Hard to Deploy,
Harder to Manage
Carbon Black
Adapt Only as Quickly
as Your Block Lists
Symantec
Security Limited
to Signatures
Verticals
Energy
Federal Government
Finance
Healthcare
Higher Education
K-12 Education
Manufacturing
Retail
Services
Strategic Services
PinnacleOne
Strategic Advisory Group
Services Overview
Threat Services
WatchTower
Threat Hunting
Hunting for Emerging Threat Campaigns
Vigilance Respond
MDR
Dedicated SOC
Expertise & Analysis
Vigilance Respond Pro
MDR + DFIR
24x7 MDR with Full-Scale Investigation & Response
Support, Deployment, & Health
Technical Account Management
Customer Success with Personalized Service
SentinelOne GO
Guided Onboarding & Deployment Advisory
SentinelOne University
Live and On-Demand Training
Support Services
Tiered Support Options for Every Organization
SentinelOne Community
Community Login
Partners
Our Network
MSSP Partners
Succeed Faster
with SentinelOne
Singularity Marketplace
Extend the Power
of S1 Technology
Cyber Risk
Partners
Enlist Pro Response
and Advisory Teams
Technology Alliances
Integrated, Enterprise-Scale Solutions
SentinelOne for AWS
Hosted in AWS Regions Around the World
Channel Partners
Deliver the Right
Solutions, Together
Program Overview
Resources
Resource Center
Case Studies
Data Sheets
eBooks
Reports
Videos
Webinars
White Papers
View All Resources
Blog
Feature Spotlight
For CISO/CIO
From the Front Lines
Identity
Cloud
macOS
SentinelOne Blog
Blog
Tech Resources
SentinelLABS
Ransomware Anthology
Cybersecurity 101
About
About SentinelOne
About SentinelOne
The Industry Leader in Cybersecurity
Investor Relations
Financial Information & Events
SentinelLABS
Threat Research for
the Modern Threat Hunter
Careers
The Latest Job Opportunities
Press & News
Company Announcements
Cybersecurity Blog
The Latest Cybersecurity Threats, News, & More
F1 Racing
SentinelOne &
Aston Martin F1 Team
FAQ
Get Answers to Our Most Frequently Asked Questions
DataSet
The Live Data Platform
S Foundation
Securing a Safer Future for All
S Ventures
Investing in the Next Generation of Security and Data
en
English
日本語
Deutsch
Español
Français
Italiano
Dutch
한국어
Get a Demo
Ransomware Anthology
Welcome to our Ransomware Anthology page, where we comprehensively review the most prominent ransomware families seen in the wild.
Agenda (Qilin)
Learn More
Akira
Learn More
Black Basta
Learn More
BlackCat
Learn More
BlueSky
Learn More
Cheerscrypt
Learn More
Cl0P
Learn More
Conti
Learn More
Dark Angels Team
Learn More
Darky Lock
Learn More
Grief
Learn More
Hades
Learn More
Hello Kitty
Learn More
HelloXD
Learn More
Hive
Learn More
HolyGhost
Learn More
IceFire
Learn More
Lilith
Learn More
LockBit 3.0 (LockBit Black)
Learn More
Marlock
Learn More
Maui
Learn More
Maze
Learn More
Midas
Learn More
Mindware
Learn More
Moses Staff
Learn More
Prestige
Learn More
Prometheus
Learn More
PYSA
Learn More
Qyick
Learn More
RansomEXX
Learn More
RansomHouse
Learn More
REvil
Learn More
Ryuk
Learn More
Sparta
Learn More
Thanos
Learn More
Venus
Learn More
Vice Society
Learn More
Zeon
Learn More