{"id":36236,"date":"2020-07-23T20:00:09","date_gmt":"2020-07-23T20:00:09","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=91594"},"modified":"2020-07-23T20:00:09","modified_gmt":"2020-07-23T20:00:09","slug":"afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/","title":{"rendered":"Afternoon Cyber Tea: Peak, Plateau, or Plummet? Cyber security trends that are here to stay and how to detect and recover from ransomware attacks"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/07\/WCO18_ITHelp_005-7-23-BANNER.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>The rapidity of change in the cyberthreat landscape can be daunting for today\u2019s cyber defense teams. Just as they perfect the ability to block one attack method, adversaries change their approach. Tools like artificial intelligence and machine learning allow us to pivot quickly, however, knowing what cyber trends are real and which are hype can be the difference between success or struggle. To help you figure where to focus your resources, <a href=\"https:\/\/www.podcastone.com\/episode\/Peak-Plateau-or-Plummet\" target=\"_blank\" rel=\"noopener noreferrer\">Kevin Beaumont joined me on Afternoon Cyber Tea<\/a>.<\/p>\n<p>Kevin is a thought leader on incident detection and response. His experience running Security Operations Centers (SOC) has given him great insight into both the tactics used by attackers and how to create effective cyber teams. While our discussion took place before he joined Microsoft, his insights remain of great value as we look at how current cyber trends will evolve past the pandemic.<\/p>\n<p>In this episode, he shares his cyber experience on everything from the role ransomware plays in the monetization of cybercrime, to what attack vectors may <a href=\"https:\/\/www.podcastone.com\/episode\/Peak-Plateau-or-Plummet\" target=\"_blank\" rel=\"noopener noreferrer\">Peak, Plateau, or Plummet, and which trends that are here to stay<\/a>.<\/p>\n<h3>What\u2019s next<\/h3>\n<p>In this important cyber series, I talk with cybersecurity influencers about trends shaping the threat landscape and explore the risk and promise of systems powered by AI, Internet of Things (IoT), and other emerging tech. As we work on how to help empower every person and organization on the planet achieve more, we must look at how we combine our security learnings with examining how today\u2019s cybersecurity investments will shape our industry and impact tomorrow\u2019s cybersecurity reality.<\/p>\n<p><strong>You can listen to Afternoon Cyber Tea with Ann Johnson on:<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/afternoon-cyber-tea-with-ann-johnson\/id1484676119\" target=\"_blank\" rel=\"noopener noreferrer\">Apple Podcasts<\/a>\u2014You can also download the episode by clicking the Episode Website link.<\/li>\n<li><a href=\"https:\/\/www.podcastone.com\/episode\/State-of-Cybersecurity-Marc-Goodman\" target=\"_blank\" rel=\"noopener noreferrer\">Podcast One<\/a>\u2014Includes the option to subscribe, so you\u2019re notified as soon as new episodes are available.<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/ciso-cybersecurity-strategy\" target=\"_blank\" rel=\"noopener noreferrer\">CISO Spotlight page<\/a>\u2014Listen alongside our CISO Spotlight episodes, where customers and security experts discuss similar topics such as Zero Trust, compliance, going passwordless, and more.<\/li>\n<\/ul>\n<p>In the meantime, bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity. Or reach out to me on&nbsp;<a href=\"https:\/\/www.linkedin.com\/in\/ann-johnsons\/\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a>&nbsp;or&nbsp;<a href=\"https:\/\/twitter.com\/ajohnsocyber\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>&nbsp;if you have guest or topic suggestions.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/07\/23\/afternoon-cyber-tea-peak-plateau-plummet-cyber-security-trends-recover-ransomware-attacks\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The rapidity of change in the cyberthreat landscape can be daunting for today\u2019s cyber defense teams. Just as they perfect the ability to block one attack method, adversaries change their approach.<br \/>\nThe post Afternoon Cyber Tea: Peak, Plateau, or Plummet? Cyber security trends that are here to stay and how to detect and recover from ransomware attacks appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36237,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[7835,6577,6579,347,77,1064],"class_list":["post-36236","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-ciso","tag-ciso-series","tag-ciso-series-page","tag-cybersecurity","tag-iot","tag-security-intelligence"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Afternoon Cyber Tea: Peak, Plateau, or Plummet? Cyber security trends that are here to stay and how to detect and recover from ransomware attacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Afternoon Cyber Tea: Peak, Plateau, or Plummet? Cyber security trends that are here to stay and how to detect and recover from ransomware attacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-23T20:00:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Afternoon Cyber Tea: Peak, Plateau, or Plummet? Cyber security trends that are here to stay and how to detect and recover from ransomware attacks\",\"datePublished\":\"2020-07-23T20:00:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/\"},\"wordCount\":413,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks.png\",\"keywords\":[\"CISO\",\"CISO series\",\"Ciso series page\",\"Cybersecurity\",\"IoT\",\"Security Intelligence\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/\",\"name\":\"Afternoon Cyber Tea: Peak, Plateau, or Plummet? Cyber security trends that are here to stay and how to detect and recover from ransomware attacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks.png\",\"datePublished\":\"2020-07-23T20:00:09+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks.png\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISO\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/ciso\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Afternoon Cyber Tea: Peak, Plateau, or Plummet? Cyber security trends that are here to stay and how to detect and recover from ransomware attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Afternoon Cyber Tea: Peak, Plateau, or Plummet? Cyber security trends that are here to stay and how to detect and recover from ransomware attacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Afternoon Cyber Tea: Peak, Plateau, or Plummet? Cyber security trends that are here to stay and how to detect and recover from ransomware attacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-07-23T20:00:09+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Afternoon Cyber Tea: Peak, Plateau, or Plummet? Cyber security trends that are here to stay and how to detect and recover from ransomware attacks","datePublished":"2020-07-23T20:00:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/"},"wordCount":413,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks.png","keywords":["CISO","CISO series","Ciso series page","Cybersecurity","IoT","Security Intelligence"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/","url":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/","name":"Afternoon Cyber Tea: Peak, Plateau, or Plummet? Cyber security trends that are here to stay and how to detect and recover from ransomware attacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks.png","datePublished":"2020-07-23T20:00:09+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks.png","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-peak-plateau-or-plummet-cyber-security-trends-that-are-here-to-stay-and-how-to-detect-and-recover-from-ransomware-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"CISO","item":"https:\/\/www.threatshub.org\/blog\/tag\/ciso\/"},{"@type":"ListItem","position":3,"name":"Afternoon Cyber Tea: Peak, Plateau, or Plummet? Cyber security trends that are here to stay and how to detect and recover from ransomware attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36236"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36236\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36237"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}