Black Kite vs. The Competition See the Difference →

Uncover Your Ransomware Susceptibility

Know the Likelihood of a Ransomware Attack to Your Organization With Black Kite’s Ransomware Susceptibility Index®

Free RSI™ Rating

Understand which vendors are most prone to ransomware with a tool that calculates event susceptibility within minutes.

Develop an effective course of action for remediation by cross correlating findings with Black Kite’s Cyber Risk Assessment.

Avoid production, reputation and financial losses by using reliable data to develop more informed policies.

Know the likelihood of a ransomware attack in minutes

New Video

The world’s first and only Ransomware Susceptibility Index® unveils critical indicators with complete transparency.

Watch Now

Black Kite’s RSI™ in Action

Using data and machine learning, Black Kite’s RSI™ discovers the likelihood that an organization will experience a ransomware attack.

Data Breach Index (DBI)
Ransomware Susceptibility Index® (RSI™)
0.0
1.0

The Black Kite RSI™ follows a process of inspecting, transforming, and modeling collected from a variety of OSINT sources (internet wide scanners, hacker forums, the deep/dark web and more). Using the data and machine learning, the correlation between control items is identified to provide approximations.

Ransomware threat landscape report cover

Exclusive Industry Insight About Ransomware Risk

In our first annual Ransomware Threat Landscape Report, Black Kite Research conducted an analysis and gathering of ransomware attacks over the last year.

Download Report

Ransomware Common Indicators

Ransomware
Phishing
or fraudulent
domains
Leaked
credentials
Company
size
Company
industry
Stealer
logs
Endpoint
security
Email
security
Vulnerabilities
with remote
code execution
Open
critical
ports

Free RSI™ Rating

Ransomware report: Latest attacks and news

Loading…

RECENT UPDATES

How the Black Kite Parser Aids Procurement and Compliance Management
How the Black Kite Parser Aids Procurement and Compliance Management
Businesses are relying on outsourcing more than ever to facilitate workflows and enable productivity — which means co…
Read More
What Is Cyber Resilience?
What Is Cyber Resilience?
There’s a common misconception about what cyber resilience is that prevents organizations from achieving it. Many sec…
Read More
Top 10 Ways Threat Actors Are Targeting Companies in 2023
Top 10 Ways Threat Actors Are Targeting Companies in 2023
When it comes to cybersecurity, knowledge is power. After all, you can’t protect your organization against threats yo…
Read More
Do Third-Party Cyber Risk Management the “Right Way” — and Save on Costs
Do Third-Party Cyber Risk Management the “Right Way” — and Save on Costs
Thinking about third-party cyber risk management can send a lot of organizations into a panic. Ultimately, most of th…
Read More
What You Need To Know About the Different Types of Hackers
What You Need To Know About the Different Types of Hackers
There’s a popular misconception about what hackers look like. Most laypeople picture hackers as the Hollywood-ified n…
Read More

Ready to get started?