Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From Data Theft to Production Shutdown: The Top 3 Ransomware Threats Facing U.S. Manufacturers in 2026

The manufacturing sector remains one of the most aggressively targeted industries in the ransomware economy. In 2026, threat actors are no longer merely encrypting file servers-they are disrupting production lines, freezing ERP systems, and leveraging operational downtime as a strategic pressure point.

Cyberattacks on Hospitals Are Attacks on Communities: Why Ransomware Is a Patient Safety Crisis

In this episode of Building Cyber Resilience: A Healthcare Leader’s Guide, host Josh Howell speaks with John Riggi, National Advisor for Cybersecurity and Risk at the American Hospital Association. Drawing on nearly 30 years at the FBI and his current work advising more than 5,000 hospitals, Riggi explains why ransomware attacks on healthcare should be treated as threat-to-life events. He breaks down the real-world consequences of cyberattacks, from ambulance diversion to delayed cancer care, and outlines what leaders must do now to prepare for outages that last weeks, not hours.

Leaked Credentials: The Hidden Supply Chain Powering Modern Ransomware Attacks

Ransomware incidents are often perceived as sudden, destructive events triggered by malicious payloads. In reality, many modern ransomware attacks begin much earlier and in a far less visible way: with compromised credentials and pre-existing access sold in underground markets. Threat intelligence collected from access broker activity and credential exposure sources indicates that ransomware operators increasingly rely on purchased access rather than direct exploitation.

Key Lessons from the Major Ransomware Attacks in Recent Months

The biggest ransomware attacks of 2025 have shown that this threat remains critical for organizations across all sectors. Incidents such as the Change Healthcare attack, which compromised the data of nearly 190 million individuals, and the attack on Jaguar Land Rover, which forced production lines to halt and caused losses amounting to hundreds of millions of dollars, show that a single incident can impact both operational continuity and information confidentiality.

Amit Malik gives you an inside look at new attack methods being used by adversaries

Attackers are using AI and LLMs in unique ways to increase their capabilities and minimize their footprint; so how can defenders respond? Don’t miss this episode of Data Security Decoded with Amit Malik, a Staff Security Researcher at Rubrik Zero Labs, who gives you an inside look at new attack methods being used by adversaries. Get Data Security Decoded wherever you listen to your podcasts, or subscribe to our channel!

1,500% Surge in New Malware: Why MSPs Must Act Now

The latest findings from WatchGuard Technologies reveal a stark reality for managed service providers: cyber threats are not only increasing—they’re evolving faster than traditional defenses can keep up. In its newest Internet Security Report, WatchGuard identified a 1,548% spike in new, unique malware from Q3 to Q4 2025. Nearly one in four threats bypassed signature-based detection, highlighting a critical gap in reactive security models still used across many customer environments.

Protecting Azure DevOps with Rubrik

Your code is one of your organization’s most critical assets, and protecting it should be as resilient as the applications it builds. In this video, we walk through how Rubrik delivers enterprise-grade protection for enterprise-critical code by securing Azure DevOps repositories against accidental deletion, malicious activity, and ransomware threats.