Experiencing a Breach?
1-855-868-3733
Contact
Cybersecurity Blog
en
English
日本語
Deutsch
Español
Français
Italiano
Dutch
한국어
Platform
Platform Overview
Singularity Platform
Welcome to Integrated
Enterprise Security
Singularity XDR
Native & Open Protection,
Detection, and Response
Singularity Data Lake
AI-Powered,
Unified Data Lake
How It Works
The Singularity XDR Difference
Singularity Marketplace
One-Click Integrations to Unlock the Power of XDR
Surfaces
Endpoint
Autonomous Prevention, Detection, and Response
Cloud
Autonomous Runtime Protection for Workloads
Identity
Autonomous Identity & Credential Protection
Platform Packages
Singularity
Complete
The Standard for Enterprise Cybersecurity
Singularity
Control
Organization-Wide
Protection and Control
Singularity
Core
Cloud-Native NGAV
Package Comparison
Our Platform at a Glance
Platform Products
Singularity
Cloud Workload Security
Real-Time Cloud Workload Protection Platform
Purple AI
Accelerate SecOps with Generative AI
Singularity
Mobile
Mobile Threat Defense
Singularity
Threat Intelligence
Comprehensive adversary intelligence
Singularity
Cloud
Data Security
AI-Powered Threat Detection
Singularity
RemoteOps Forensics
Orchestrate Forensics at Scale
Singularity
Identity
Identity Threat Detection
and Response
Singularity
Ranger AD
Active Directory Attack Surface Reduction
Singularity
Ranger Insights
Rogue Asset Discovery
Singularity
Hologram
Deception Protection
Why SentinelOne?
Why SentinelOne?
Why SentinelOne?
Cybersecurity Built
for What’s Next
Our Customers
Trusted by the World’s Leading Enterprises
Industry Recognition
Tested and Proven
by the Experts
About Us
The Industry Leader in Autonomous Cybersecurity
Compare SentinelOne
CrowdStrike
Cyber Dependent
on a Crowd
McAfee
Pale Performance,
More Maintenance
Microsoft
Platform Coverage
That Compromises
Trend Micro
The Risk of DevOps Disruption
Palo Alto Networks
Hard to Deploy,
Harder to Manage
Carbon Black
Adapt Only as Quickly
as Your Block Lists
Symantec
Security Limited
to Signatures
Verticals
Energy
Federal Government
Finance
Healthcare
Higher Education
K-12 Education
Manufacturing
Retail
Services
Strategic Services
PinnacleOne
Strategic Advisory Group
Services Overview
Threat Services
Vigilance Respond Pro
MDR + DFIR
24x7 MDR with Full-Scale Investigation & Response
WatchTower Pro
Threat Hunting
Dedicated Hunting & Compromise Assessment
Vigilance Respond
MDR
Dedicated SOC
Expertise & Analysis
WatchTower
Threat Hunting
Hunting for Emerging Threat Campaigns
Support, Deployment, & Health
Technical Account Management
Customer Success with Personalized Service
SentinelOne GO
Guided Onboarding & Deployment Advisory
SentinelOne University
Live and On-Demand Training
Support Services
Tiered Support Options for Every Organization
SentinelOne Community
Community Login
Partners
Our Network
MSSP Partners
Succeed Faster
with SentinelOne
Singularity Marketplace
Extend the Power
of S1 Technology
Cyber Risk
Partners
Enlist Pro Response
and Advisory Teams
Technology Alliances
Integrated, Enterprise-Scale Solutions
SentinelOne for AWS
Hosted in AWS Regions Around the World
Channel Partners
Deliver the Right
Solutions, Together
Program Overview
Resources
Resource Center
Case Studies
Data Sheets
eBooks
Reports
Videos
Webinars
White Papers
View All Resources
Blog
Cyber Response
Feature Spotlight
For CISO/CIO
From the Front Lines
Identity
Cloud
macOS
SentinelOne Blog
Blog
Tech Resources
SentinelLABS
Ransomware Anthology
Cybersecurity 101
About
About SentinelOne
About SentinelOne
The Industry Leader in Cybersecurity
Investor Relations
Financial Information & Events
SentinelLABS
Threat Research for
the Modern Threat Hunter
Careers
The Latest Job Opportunities
Press & News
Company Announcements
Cybersecurity Blog
The Latest Cybersecurity Threats, News, & More
F1 Racing
SentinelOne &
Aston Martin F1 Team
FAQ
Get Answers to Our Most Frequently Asked Questions
DataSet
The Live Data Platform
S Foundation
Securing a Safer Future for All
S Ventures
Investing in the Next Generation of Security and Data
Brand
SentinelOne Brand Guidelines
en
English
日本語
Deutsch
Español
Français
Italiano
Dutch
한국어
Get a Demo
Back
Platform
Platform Overview
Singularity Platform
Welcome to Integrated
Enterprise Security
Singularity XDR
Native & Open Protection,
Detection, and Response
Singularity Data Lake
AI-Powered,
Unified Data Lake
How It Works
The Singularity XDR Difference
Singularity Marketplace
One-Click Integrations to Unlock the Power of XDR
Surfaces
Endpoint
Autonomous Prevention, Detection, and Response
Cloud
Autonomous Runtime Protection for Workloads
Identity
Autonomous Identity & Credential Protection
Platform Packages
Singularity
Complete
The Standard for Enterprise Cybersecurity
Singularity
Control
Organization-Wide
Protection and Control
Singularity
Core
Cloud-Native NGAV
Package Comparison
Our Platform at a Glance
Platform Products
Singularity
Cloud Workload Security
Real-Time Cloud Workload Protection Platform
Purple AI
Accelerate SecOps with Generative AI
Singularity
Mobile
Mobile Threat Defense
Singularity
Threat Intelligence
Comprehensive adversary intelligence
Singularity
Cloud
Data Security
AI-Powered Threat Detection
Singularity
RemoteOps Forensics
Orchestrate Forensics at Scale
Singularity
Identity
Identity Threat Detection
and Response
Singularity
Ranger AD
Active Directory Attack Surface Reduction
Singularity
Ranger Insights
Rogue Asset Discovery
Singularity
Hologram
Deception Protection
Why SentinelOne?
Why SentinelOne?
Why SentinelOne?
Cybersecurity Built
for What’s Next
Our Customers
Trusted by the World’s Leading Enterprises
Industry Recognition
Tested and Proven
by the Experts
About Us
The Industry Leader in Autonomous Cybersecurity
Compare SentinelOne
CrowdStrike
Cyber Dependent
on a Crowd
McAfee
Pale Performance,
More Maintenance
Microsoft
Platform Coverage
That Compromises
Trend Micro
The Risk of DevOps Disruption
Palo Alto Networks
Hard to Deploy,
Harder to Manage
Carbon Black
Adapt Only as Quickly
as Your Block Lists
Symantec
Security Limited
to Signatures
Verticals
Energy
Federal Government
Finance
Healthcare
Higher Education
K-12 Education
Manufacturing
Retail
Services
Strategic Services
PinnacleOne
Strategic Advisory Group
Services Overview
Threat Services
Vigilance Respond Pro
MDR + DFIR
24x7 MDR with Full-Scale Investigation & Response
WatchTower Pro
Threat Hunting
Dedicated Hunting & Compromise Assessment
Vigilance Respond
MDR
Dedicated SOC
Expertise & Analysis
WatchTower
Threat Hunting
Hunting for Emerging Threat Campaigns
Support, Deployment, & Health
Technical Account Management
Customer Success with Personalized Service
SentinelOne GO
Guided Onboarding & Deployment Advisory
SentinelOne University
Live and On-Demand Training
Support Services
Tiered Support Options for Every Organization
SentinelOne Community
Community Login
Partners
Our Network
MSSP Partners
Succeed Faster
with SentinelOne
Singularity Marketplace
Extend the Power
of S1 Technology
Cyber Risk
Partners
Enlist Pro Response
and Advisory Teams
Technology Alliances
Integrated, Enterprise-Scale Solutions
SentinelOne for AWS
Hosted in AWS Regions Around the World
Channel Partners
Deliver the Right
Solutions, Together
Program Overview
Resources
Resource Center
Case Studies
Data Sheets
eBooks
Reports
Videos
Webinars
White Papers
View All Resources
Blog
Cyber Response
Feature Spotlight
For CISO/CIO
From the Front Lines
Identity
Cloud
macOS
SentinelOne Blog
Blog
Tech Resources
SentinelLABS
Ransomware Anthology
Cybersecurity 101
About
About SentinelOne
About SentinelOne
The Industry Leader in Cybersecurity
Investor Relations
Financial Information & Events
SentinelLABS
Threat Research for
the Modern Threat Hunter
Careers
The Latest Job Opportunities
Press & News
Company Announcements
Cybersecurity Blog
The Latest Cybersecurity Threats, News, & More
F1 Racing
SentinelOne &
Aston Martin F1 Team
FAQ
Get Answers to Our Most Frequently Asked Questions
DataSet
The Live Data Platform
S Foundation
Securing a Safer Future for All
S Ventures
Investing in the Next Generation of Security and Data
Brand
SentinelOne Brand Guidelines
Get a Demo
1-855-868-3733
Contact
Cybersecurity Blog
Experiencing a Breach?
1-855-868-3733
Contact
Cybersecurity Blog
Ransomware Anthology
Welcome to our Ransomware Anthology page, where we comprehensively review the most prominent ransomware families seen in the wild.
Agenda (Qilin)
Learn More
Akira
Learn More
Black Basta
Learn More
BlackCat
Learn More
BlueSky
Learn More
Cheerscrypt
Learn More
Cl0P
Learn More
Conti
Learn More
Dark Angels Team
Learn More
Darky Lock
Learn More
Grief
Learn More
Hades
Learn More
Hello Kitty
Learn More
HelloXD
Learn More
Hive
Learn More
HolyGhost
Learn More
IceFire
Learn More
Lilith
Learn More
LockBit 3.0 (LockBit Black)
Learn More
Marlock
Learn More
Maui
Learn More
Maze
Learn More
Midas
Learn More
Mindware
Learn More
Moses Staff
Learn More
Prestige
Learn More
Prometheus
Learn More
PYSA
Learn More
Qyick
Learn More
RansomEXX
Learn More
RansomHouse
Learn More
REvil
Learn More
Ryuk
Learn More
Sparta
Learn More
Thanos
Learn More
Venus
Learn More
Vice Society
Learn More
Zeon
Learn More