Search

Uncover your Ransomware Susceptibility

Know the likelihood of a ransomware attack to your organization with black kite’s ransomware susceptibility index®

FREE RSI™ Rating
Understand which vendors are most prone to ransomware with a tool that calculates event susceptibility within minutes.
Develop an effective course of action for remediation by cross correlating findings with Black Kite’s Cyber Risk Assessment.
Avoid production, reputation and financial losses by using reliable data to develop more informed policies.

Know the likelihood of a ransomware attack in minutes

New Video

The world’s first and only Ransomware Susceptibility Index® unveils critical indicators with complete transparency.

Watch Now

Black Kite’s RSI™ in Action

Using data and machine learning, Black Kite’s RSI™ discovers the likelihood that an organization will experience a ransomware attack.

Data Breach Index (DBI)
Ransomware Susceptibility Index® (RSI™)
0.0
1.0

The Black Kite RSI™ follows a process of inspecting, transforming, and modeling collected from a variety of OSINT sources (internet wide scanners, hacker forums, the deep/dark web and more). Using the data and machine learning, the correlation between control items is identified to provide approximations.

How Ransomware Wars Threaten Third-Party Cyber Ecosystems

What’s new in ransomware? Plenty.

Black Kite’s 2025 Ransomware Report reveals a 24% surge in attacks, with SMBs and supply chains in the crosshairs. Interestingly, payments are down, but don’t mistake that for lower risk – the threat is evolving as ransomware groups battle for top billing.

Read Report

Ransomware Common Indicators

Ransomware
Phishing
or fraudulent
domains
Leaked
credentials
Company
size
Company
industry
Stealer
logs
Endpoint
security
Email
security
Vulnerabilities
with remote
code execution
Open
critical
ports

Free RSI™ Rating

Ransomware report: Latest attacks and news

Loading…

RECENT UPDATES

Focus Friday: TPRM Insights into Tridium Niagara and Elastic Kibana Vulnerabilities
Focus Friday: TPRM Insights into Tridium Niagara and Elastic Kibana Vulnerabilities
Written by: Ferdi Gül Welcome to this week’s Focus Friday blog post, where we explore critical vulnerabilities wit…
Read More
FOCUS FRIDAY: Strategic TPRM Insights Into ScreenConnect and Roundcube Vulnerabilities
FOCUS FRIDAY: Strategic TPRM Insights Into ScreenConnect and Roundcube Vulnerabilities
Written by: Ferdi Gül Welcome to this week’s Focus Friday, where we spotlight the latest high-profile cybersecurit…
Read More
Now’s the Time for Agile, Data-Driven TPRM (and Our Latest Research Proves It)
Now’s the Time for Agile, Data-Driven TPRM (and Our Latest Research Proves It)
Written by: Bob Maley, Chief Security Officer Third parties aren’t just part of your digital ecosystem—they are yo…
Read More
Focus Friday: TPRM Insights into Zimbra, Draytek Vigor, Atlassian Jira Data Center, Tornado, and MDaemon Vulnerabilities
Focus Friday: TPRM Insights into Zimbra, Draytek Vigor, Atlassian Jira Data Center, Tornado, and MDaemon Vulnerabilities
Written by: Ferdi Gül This Week’s Emerging Third-Party Risks in Email Infrastructure and Web Frameworks Welcome…
Read More
How to Implement Vulnerability Management in TPRM
How to Implement Vulnerability Management in TPRM
Written by: Ferhat Dikbiyik, Chief Research & Intelligence Officer With over 40,000 vulnerabilities disclosed …
Read More

Ready to get started?