Search

Uncover your Ransomware Susceptibility

Know the likelihood of a ransomware attack to your organization with black kite’s ransomware susceptibility index®

FREE RSI™ Rating
Understand which vendors are most prone to ransomware with a tool that calculates event susceptibility within minutes.
Develop an effective course of action for remediation by cross correlating findings with Black Kite’s Cyber Risk Assessment.
Avoid production, reputation and financial losses by using reliable data to develop more informed policies.

Know the likelihood of a ransomware attack in minutes

New Video

The world’s first and only Ransomware Susceptibility Index® unveils critical indicators with complete transparency.

Watch Now

Black Kite’s RSI™ in Action

Using data and machine learning, Black Kite’s RSI™ discovers the likelihood that an organization will experience a ransomware attack.

Data Breach Index (DBI)
Ransomware Susceptibility Index® (RSI™)
0.0
1.0

The Black Kite RSI™ follows a process of inspecting, transforming, and modeling collected from a variety of OSINT sources (internet wide scanners, hacker forums, the deep/dark web and more). Using the data and machine learning, the correlation between control items is identified to provide approximations.

State of Ransomware 2024: A Year of Surges and Shuffling

This report reveals the evolving strategies of these cybercriminals, including their increasingly sophisticated tactics, cross-collaboration between groups, and the concerning trend of targeting industries once considered off-limits.

Read Report

Ransomware Common Indicators

Ransomware
Phishing
or fraudulent
domains
Leaked
credentials
Company
size
Company
industry
Stealer
logs
Endpoint
security
Email
security
Vulnerabilities
with remote
code execution
Open
critical
ports

Free RSI™ Rating

Ransomware report: Latest attacks and news

Loading…

RECENT UPDATES

Introducing Black Kite Bridge™: Vendor Engagement to Reduce Supply Chain Risk at Scale
Introducing Black Kite Bridge™: Vendor Engagement to Reduce Supply Chain Risk at Scale
Written by: Jason McLarney Every organization struggles with vendor engagement, period. There are two key scena…
Read More
FOCUS FRIDAY: TPRM INSIGHTS INTO THE PAN-OS CLEARTEXT VULNERABILITY & A SNEAK PEEK INTO WHAT’S NEXT
FOCUS FRIDAY: TPRM INSIGHTS INTO THE PAN-OS CLEARTEXT VULNERABILITY & A SNEAK PEEK INTO WHAT’S NEXT
Written By: Ferdi Gül & Ferhat Dikbiyik Welcome to this week’s Focus Friday blog, where we continue to explore…
Read More
Don’t Wait for Ransomware: RiskBusters Shows How to See It Coming
Don’t Wait for Ransomware: RiskBusters Shows How to See It Coming
Written by: Bob Maley Ransomware is a significant concern for many businesses, and understandably so. Black Kite’s…
Read More
Stuck on Defense: Don’t Use a Security Rating Score Alone to Manage Vendor Risk
Stuck on Defense: Don’t Use a Security Rating Score Alone to Manage Vendor Risk
Written by: Bob Maley If it rained yesterday, should you wear a raincoat today? It’s not a simple answer. You need…
Read More
FOCUS FRIDAY: MANAGING THIRD-PARTY RISKS FROM DAHUA IP CAMERA, SONICWALL FIREWALL, AND WPML, FILECATALYST WORKFLOW VULNERABILITIES WITH BLACK KITE’S FOCUSTAGS™
FOCUS FRIDAY: MANAGING THIRD-PARTY RISKS FROM DAHUA IP CAMERA, SONICWALL FIREWALL, AND WPML, FILECATALYST WORKFLOW VULNERABILITIES WITH BLACK KITE’S FOCUSTAGS™
Written By: Ferdi GülContributor: Ferhat Dikbiyik Welcome to this week’s Focus Friday, where we dive into the late…
Read More

Ready to get started?