{"content_customizations":null,"shortcut_customizations":[{"id":3562,"created_at":"2022-11-14T15:15:17.995776Z","updated_at":"2022-11-14T15:15:18.001252Z","action":"DOWNLOAD","color":"#FFFFFF","icon_url":"https://app-media-production.s3.amazonaws.com/client_docs/client_documents/557/shortcut_customizations/ce51e198c0b0462493657fc66b24aff5/download_icon.svg","additional_data":{"download_url":"https://media.celero.io/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/original_file.pdf"},"content":4266}],"content_thumbnail":{"original":"/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/thumbnails/1.jpg","high_quality":{"small":"/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/thumbnails_high_quality/1.jpg","medium":"/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/thumbnails_high_quality/1_medium.jpg","large":"/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/thumbnails_high_quality/1_large.jpg","microsite_preview":"/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/thumbnails_high_quality/preview.jpg"}},"version":{"version_number":1,"version_details":{"uuid":"f9755207-6539-42ca-8667-837ad1f194f9","name":"Cognyte Ransomware Report","is_live":true,"access_control":{"min_stage":"EVERYONE_ALLOWED","stage_options":{"UNVERIFIED_CONTACT":{"form_preview":"LANDING_PAGE","form_id":"default"},"VERIFIED_CONTACT":{"form_preview":"LANDING_PAGE"},"GDPR_CONSENT":{},"PRIVATE":{},"EVERYONE_ALLOWED":{}}},"base_shorten":null,"tags":[1]},"is_active":true,"type":"DESKTOP","version":"f9755207-6539-42ca-8667-837ad1f194f9","content_uuid":"f9755207-6539-42ca-8667-837ad1f194f9","version_id":"f9755207-6539-42ca-8667-837ad1f194f9"},"custom_events":[],"content_action":null,"content_stats":{"version":"f9755207-6539-42ca-8667-837ad1f194f9","visitors_count":6,"lifetime_visitors_count":null,"last_seen":"2026-04-12T00:00:00Z","last_updated":"2026-04-17T04:25:41Z","account":"bb8a3966-0b81-40b5-9d7b-a8cd2a25ee82"},"content_meta_tags":null,"keywords":[],"seo_content_version_name":"cognyte-ransomware-report","html_snippets":null,"is_live":true,"shorten":"https://engage.cognyte.com/s/33bf338e/cognyte-ransomware-report/","base_url":"/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2","config":{"pagecount":38,"bounds":[[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286]]},"annotations":{"pages":[{"page":32,"annotations":[{"type":"TextLink","bounds":[83,1201,672,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/another-ransomware-now-uses-ddos-attacks-to-force-victims-to-pay/"}}]},{"page":34,"annotations":[{"type":"TextLink","bounds":[83,1201,355,12],"action":{"type":"URI","uri":"https://developer.linkedin.com/docs/reference/industry-codes"}}]},{"page":6,"annotations":[{"type":"TextLink","bounds":[80,1193,208,12],"action":{"type":"URI","uri":"https://www.cisa.gov/ransomware"}}]},{"page":8,"annotations":[{"type":"TextLink","bounds":[80,1164,243,12],"action":{"type":"URI","uri":"https://attack.mitre.org/tactics/TA0010/"}}]},{"page":9,"annotations":[{"type":"TextLink","bounds":[80,1199,191,12],"action":{"type":"URI","uri":"https://threatpost.com/ransom"}}]},{"page":10,"annotations":[{"type":"TextLink","bounds":[81,1199,659,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/ransomware-gangs-team-up-to-form-extortion-cartel/"}}]},{"page":13,"annotations":[{"type":"TextLink","bounds":[80,1187,269,12],"action":{"type":"URI","uri":"https://arstechnica.com/information-technolog"}}]},{"page":14,"annotations":[{"type":"TextLink","bounds":[80,1186,164,12],"action":{"type":"URI","uri":"https://intel471.com/blog/re"}},{"type":"TextLink","bounds":[80,1167,159,12],"action":{"type":"URI","uri":"https://threatpost.com/net"}}]},{"page":15,"annotations":[{"type":"TextLink","bounds":[80,1204,541,12],"action":{"type":"URI","uri":"https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-c"}}]},{"page":22,"annotations":[{"type":"TextLink","bounds":[83,1206,529,12],"action":{"type":"URI","uri":"https://www.techrepublic.com/article/top-5-business-sectors-targeted-by-ransomware/"}}]},{"page":23,"annotations":[{"type":"TextLink","bounds":[83,1155,561,12],"action":{"type":"URI","uri":"https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-c"}},{"type":"TextLink","bounds":[83,1174,352,12],"action":{"type":"URI","uri":"https://securelist.com/ics-threat-predictions-for-2021/99613/"}},{"type":"TextLink","bounds":[83,1120,634,12],"action":{"type":"URI","uri":"https://blog.scadafence.com/snake-/-ekans-ransomware-nation-state-attackers-deploy-ot-oriented-malware"}},{"type":"TextLink","bounds":[83,1190,396,12],"action":{"type":"URI","uri":"https://f.hubspotusercontent10.net/hubfs/5943619/Whitepaper-Do"}},{"type":"TextLink","bounds":[83,1138,492,12],"action":{"type":"URI","uri":"https://www.dragos.com/blog/industry-news/manufacturing-sector-cyber-threats/"}}]},{"page":24,"annotations":[{"type":"TextLink","bounds":[83,1186,653,11],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/iranian-nation-state-hackers-linked-to-pay2key-ransomware/"}},{"type":"TextLink","bounds":[83,1149,613,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/chinas-apt-hackers-move-to-ransomware-attacks/"}}]},{"page":25,"annotations":[{"type":"TextLink","bounds":[83,1151,303,12],"action":{"type":"URI","uri":"https://kb.pulsesecure.net/articles/Pulse_Securit"}}]},{"page":26,"annotations":[{"type":"TextLink","bounds":[83,1137,261,12],"action":{"type":"URI","uri":"https://msrc.microsoft.com/update-guide/"}},{"type":"TextLink","bounds":[83,1172,139,12],"action":{"type":"URI","uri":"https://threatpost.com/r"}},{"type":"TextLink","bounds":[83,1190,148,12],"action":{"type":"URI","uri":"https://media.defense.go"}}]},{"page":27,"annotations":[{"type":"TextLink","bounds":[83,1097,761,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-sells-victims-data-on-darknet-if-not-paid/"}},{"type":"TextLink","bounds":[83,1115,669,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-launches-site-to-post-victims-data/"}},{"type":"TextLink","bounds":[83,1201,672,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/foxconn-electronics-giant-hit-by-ransomware-34-million-ransom/"}},{"type":"TextLink","bounds":[83,1045,446,12],"action":{"type":"URI","uri":"https://www.crowdstrike.com/blog/doppelpaymer-ransomware-and-dridex-2/"}}]},{"page":28,"annotations":[{"type":"TextLink","bounds":[83,1207,113,12],"action":{"type":"URI","uri":"https://blog.sensec"}}]},{"page":29,"annotations":[{"type":"TextLink","bounds":[83,1172,199,12],"action":{"type":"URI","uri":"https://time.graphics/line/386203"}}]}]},"created_at":"2022-11-14T15:15:17.759679Z","updated_at":"2026-04-17T04:58:53.204871Z","original_name":"Cognyte-Ransomware-Report.pdf","uuid":"f9755207-6539-42ca-8667-837ad1f194f9","description":"GLOBAL THREAT INTELLIGENCE REPORT The Ransomware Landscape March 2021 ","is_high_quality_thumbnails_available":true,"conversion_type":"DOCUMENT"}