Black Kite vs. The Competition See the Difference →

Uncover Your Ransomware Susceptibility

Know the Likelihood of a Ransomware Attack to Your Organization With Black Kite’s Ransomware Susceptibility Index®

Free RSI™ Rating

Understand which vendors are most prone to ransomware with a tool that calculates event susceptibility within minutes.

Develop an effective course of action for remediation by cross correlating findings with Black Kite’s Cyber Risk Assessment.

Avoid production, reputation and financial losses by using reliable data to develop more informed policies.

Know the likelihood of a ransomware attack in minutes

New Video

The world’s first and only Ransomware Susceptibility Index® unveils critical indicators with complete transparency.

Watch Now

Black Kite’s RSI™ in Action

Using data and machine learning, Black Kite’s RSI™ discovers the likelihood that an organization will experience a ransomware attack.

Data Breach Index (DBI)
Ransomware Susceptibility Index® (RSI™)
0.0
1.0

The Black Kite RSI™ follows a process of inspecting, transforming, and modeling collected from a variety of OSINT sources (internet wide scanners, hacker forums, the deep/dark web and more). Using the data and machine learning, the correlation between control items is identified to provide approximations.

Ransomware threat landscape report cover

Exclusive Industry Insight About Ransomware Risk

In our first annual Ransomware Threat Landscape Report, Black Kite Research conducted an analysis and gathering of ransomware attacks over the last year.

Download Report

Ransomware Common Indicators

Ransomware
Phishing
or fraudulent
domains
Leaked
credentials
Company
size
Company
industry
Stealer
logs
Endpoint
security
Email
security
Vulnerabilities
with remote
code execution
Open
critical
ports

Free RSI™ Rating

Ransomware report: Latest attacks and news

Loading…

RECENT UPDATES

Turn Raw Risk Data into a Meaningful Risk Intelligence Report
Turn Raw Risk Data into a Meaningful Risk Intelligence Report
Written by: Bob Maley Risk intelligence reports are vital for modern companies working to reduce the risk in their…
Read More
FOCUS FRIDAY: Enhancing TPRM Through Insight on the Critical XZ Utils Vulnerability
FOCUS FRIDAY: Enhancing TPRM Through Insight on the Critical XZ Utils Vulnerability
Written by: Ferhat DikbiyikAdditional Contributions: Ferdi Gül Today, we spotlight a significant vulnerability wit…
Read More
Could TPRM Have Foreseen the XZ Utils (CVE-2024-3094) Crisis?
Could TPRM Have Foreseen the XZ Utils (CVE-2024-3094) Crisis?
Written by: Ferhat Dikbiyik The recent CVE-2024-3094 vulnerability in XZ Utils has sent shockwaves through the cyb…
Read More
FOCUS FRIDAY: TPRM INSIGHTS ON CRITICAL PostgreSQL AND pgAdmin VULNERABILITIES
FOCUS FRIDAY: TPRM INSIGHTS ON CRITICAL PostgreSQL AND pgAdmin VULNERABILITIES
Written by: Ferhat DikbiyikAdditional Contributions: Ferdi Gül In this week’s edition of Focus Friday, we’re divin…
Read More
Vendor Outreach Isn’t Always the Answer When a High-Profile Security Event Hits Your Cyber Ecosystem
Vendor Outreach Isn’t Always the Answer When a High-Profile Security Event Hits Your Cyber Ecosystem
Written by: Bob Maley Imagine a scenario in which you arrive home following a brief stint out of town, only to dis…
Read More

Ready to get started?