Free and open access is a core principle upon which Elastic was built and continues to operate. We believe distributing our key security components will enhance our product and provide a tangible benefit to researchers and practitioners alike.
Analysis of the HERMETICWIPER malware targeting Ukranian organizations.
Elastic Security verifies new destructive malware targeting Ukraine: Operation Bleeding Bear
Find out more about how Elastic Endpoint Security uses decoupled components for automated testing of its behavioral ransomware detection features.
Our research into applying machine learning classification demonstrated that ransom notes share enough features to be properly classified.
Our ransomware protection is effective at stopping well known but also emergent strains of ransomware.
Three prominent cybersecurity trends converged today: ransomware attacks, data dumps of nation-state offensive capabilities, and healthcare industry attacks.
A review of recent trends in ransomware and malware provides useful insights into what the future may hold, and allow us to better prepare for upcoming advances
The rapid transformation and growing sophistication of ransomware presents significant challenges to the security community and significant threats to users.
Spin up a fully loaded deployment on the cloud provider you choose. As the company behind Elasticsearch, we bring our features and support to your Elastic clusters in the cloud.