{"id":45099,"date":"2022-02-01T22:16:32","date_gmt":"2022-02-01T22:16:32","guid":{"rendered":"http:\/\/caaffa03-be52-4df6-b2cd-cbfff883bcb7"},"modified":"2022-02-01T22:16:32","modified_gmt":"2022-02-01T22:16:32","slug":"fending-off-ransomware-attacks-using-ai-powered-tools","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/fending-off-ransomware-attacks-using-ai-powered-tools\/","title":{"rendered":"Fending off ransomware attacks using AI-powered tools"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/f4efb40bab7f08bb3eee21abb7879d429caf491e\/2022\/02\/01\/55eea121-ad46-4a83-a47f-e07b861332eb\/cohesity-sign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" class=\"ff-og-image-inserted\"><\/div>\n<p>Zero trust-type security, which no self-respecting security software provider doesn&#8217;t now provide, is a good leap forward in the never-ending battle against the bad hacker actors of the world. But it&#8217;s turning out not to be the complete answer to storing corporate data securely for an enterprise and its users.<\/p>\n<p>Zero trust enables enterprises to restrict access controls to networks, applications, and environments without sacrificing performance and causing user ire. A zero-trust approach trusts no one, no matter how high on a security clearance ladder he or she may be. Multiple entry codes will always be needed. But ZT still needs assistance in order to provide the 24\/7 security and airtight access processes required by many enterprises, and AI is providing that help.<\/p>\n<p>This is where next-gen data protection providers such as <a href=\"https:\/\/fortinet.com\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Fortinet<\/a>, <a href=\"https:\/\/delltechnologies.com\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Dell Technologies<\/a>, <a href=\"https:\/\/forcepoint.com\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Forcepoint<\/a>, and <a href=\"https:\/\/cohesity.com\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Cohesity<\/a> come into the picture, because they all bring multiple weapons to this problem. Many of those tools use AI to identify intruders and stop exploits faster than had been available previously.<\/p>\n<p>Cohesity is the latest to produce new capabilities augmenting ZT and aimed squarely at solving the rampant ransomware problem that so many organizations \u2013 both for-profit and nonprofit \u2013 have suffered in the last few years.&nbsp;<\/p>\n<p>Early on, cybercriminals focused only on encrypting a victim&#8217;s production data. Cohesity, among others, countered by enabling users to rapidly restore from backup data. Then, criminals started to destroy or encrypt backup volumes themselves. Cohesity countered with immutability. Now, bad actors are exfiltrating the data and threatening to post it on the dark web.&nbsp;<\/p>\n<p>To help its users address the latest threats, Cohesity unveiled at its <a href=\"https:\/\/www.cohesity.com\/connect\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Cohesity Connect<\/a> conference the following SaaS offerings, which are now included in the company&#8217;s <a href=\"https:\/\/www.cohesity.com\/products\/saas\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Data Management as a Service<\/a> platform:&nbsp;<\/p>\n<ul readability=\"2.5\">\n<li readability=\"1\">\n<p><strong>Cohesity DataGovern:<\/strong> A data security and governance service that uses AI\/ML to automate the discovery of sensitive data and detect anomalous access and usage patterns that could indicate a cyberattack in play &#8212; the key to thwarting bad actors trying to exfiltrate data.&nbsp;<\/p>\n<\/li>\n<li readability=\"4\">\n<p><strong>Project Fort Knox:<\/strong> A service that allows users to maintain an isolated copy of their data in a Cohesity-managed vault to improve data resiliency in the face of ransomware attacks. In addition to immutability, the company said, this gives users another way to thwart attackers trying to encrypt data.&nbsp;<\/p>\n<\/li>\n<\/ul>\n<h3>The four pillars of next-gen data management<\/h3>\n<p>Cohesity CEO Mohit Aron told ZDNet that any provider describing its platform as &#8220;next-gen data management&#8221; must include the following four characteristics:&nbsp;<\/p>\n<ul readability=\"8\">\n<li readability=\"0\">\n<p><strong>Must be intuitive and simple to use at scale:<\/strong> Enterprise line-of-business employees should be able to use the platform at will to manage all their data optimally as needed.<\/p>\n<\/li>\n<li readability=\"-1\">\n<p><strong>Must include zero-trust security:<\/strong> Specific ransomware protection is built into this.&nbsp;<\/p>\n<\/li>\n<li readability=\"7\">\n<p><strong>Must be AI-powered:<\/strong> &#8220;The platform needs to be smart, so when something goes down, it can auto-heal itself. It must have AI-based detection of ransomware. So the whole platform must be AI-powered,&#8221; Aron said.&nbsp; Cohesity&#8217;s AI\/ML-based classification software is used to identify sensitive data &#8212; including personally identifiable information (PII) &#8212; in backup and production data, and determine who has access to it, helping to harden environments before attacks occur.<\/p>\n<\/li>\n<li readability=\"4\">\n<p><strong>Must have third-party extensibility:<\/strong> &#8220;Users shouldn&#8217;t just be able to take benefit of the products that we build, but on this platform, they should be able to extend the power of this platform by third-party applications and integrations,&#8221; Aron said.&nbsp;<\/p>\n<\/li>\n<\/ul>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p>&#8220;Relying on legacy backup as an insurance policy no longer is sufficient,&#8221; Cohesity Head of Product Matt Waxman said. &#8220;Users need next-gen technology that makes it easy to identify sensitive data, detect anomalies, isolate data, and stay ahead of modern threats. That&#8217;s what we&#8217;re focused on in our Threat Defense architecture.&#8221; &nbsp;<\/p>\n<h3>How the AI is implemented<\/h3>\n<p>In order for technologists, data architects, and software developers to learn more about how to utilize AI, ZDNet asked the following questions of Aron, who offered these details:<\/p>\n<p><strong>ZDnet: <\/strong>What AI and ML tools are you using specifically?&nbsp;<\/p>\n<p><strong>Aron:<\/strong> Applications of AI\/ML are spread across multiple areas of our product, both on the SaaS side and on-premises. One set of use cases is the use of time series (looking at data over time) anomaly detection techniques that identify potential data security threats, such as a ransomware attack, and provide alerts and guidance to the administrator. &nbsp; Another category is the use of a combination of supervised\/semi-supervised models for security analytics and data governance. For proactive performance optimization use cases, we use a variety of time-series regression models.&nbsp;<\/p>\n<p><strong>ZDnet:<\/strong> <strong>Are you using models and algorithms out of a box, such as DataRobot or other sources?&nbsp;<\/strong><\/p>\n<p><strong>Aron:<\/strong> For simpler use cases, we use off-the-shelf models with minimal tuning. For more complex ones, we integrate a set of off-the-shelf models to achieve better accuracy.&nbsp;<\/p>\n<p><strong>ZDnet:<\/strong> <strong>What cloud services are you using?&nbsp;<\/strong><\/p>\n<p><strong>Aron: <\/strong>Our Data Management as a Service portfolio of SaaS offerings runs on AWS. Our data management platform also runs on Microsoft Azure and Google Cloud.&nbsp;<\/p>\n<p><strong>ZDnet:<\/strong> <strong>Are you using the AI workflow tools that come with that cloud?&nbsp;<\/strong><\/p>\n<p><strong>Aron: <\/strong>We leverage SageMaker workflows where applicable; however, we do build our own workflows deployed on Kubernetes to support a variety of deployment models.<\/p>\n<p><strong>ZDnet: How are you labeling data for the ML and AI workflows?&nbsp;<\/strong><\/p>\n<p><strong>Aron:<\/strong> For labeling data for supervised learning use cases, we leverage pre-labeled data collected from our wide customer base in combination with our own data labeling inference workflows for augmentation.&nbsp;<\/p>\n<p><strong>ZDnet:<\/strong> <strong>Can you give us a ballpark estimate on how much data you are processing?<\/strong><\/p>\n<p><strong>Aron:<\/strong> We estimate that we process hundreds of millions of events on a daily basis for a variety of ML-enabled use cases.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/fending-off-ransomware-attacks-using-ai-powered-tools\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why Cohesity believes zero-trust security by itself isn&#8217;t enough to stop an increasing number of sophisticated ransomware attacks.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-45099","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fending off ransomware attacks using AI-powered tools 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/fending-off-ransomware-attacks-using-ai-powered-tools\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fending off ransomware attacks using AI-powered tools 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/fending-off-ransomware-attacks-using-ai-powered-tools\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-01T22:16:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/f4efb40bab7f08bb3eee21abb7879d429caf491e\/2022\/02\/01\/55eea121-ad46-4a83-a47f-e07b861332eb\/cohesity-sign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fending-off-ransomware-attacks-using-ai-powered-tools\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fending-off-ransomware-attacks-using-ai-powered-tools\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Fending off ransomware attacks using AI-powered tools\",\"datePublished\":\"2022-02-01T22:16:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fending-off-ransomware-attacks-using-ai-powered-tools\\\/\"},\"wordCount\":976,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fending-off-ransomware-attacks-using-ai-powered-tools\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/f4efb40bab7f08bb3eee21abb7879d429caf491e\\\/2022\\\/02\\\/01\\\/55eea121-ad46-4a83-a47f-e07b861332eb\\\/cohesity-sign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fending-off-ransomware-attacks-using-ai-powered-tools\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fending-off-ransomware-attacks-using-ai-powered-tools\\\/\",\"name\":\"Fending off ransomware attacks using AI-powered tools 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fending-off-ransomware-attacks-using-ai-powered-tools\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fending-off-ransomware-attacks-using-ai-powered-tools\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/f4efb40bab7f08bb3eee21abb7879d429caf491e\\\/2022\\\/02\\\/01\\\/55eea121-ad46-4a83-a47f-e07b861332eb\\\/cohesity-sign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"datePublished\":\"2022-02-01T22:16:32+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fending-off-ransomware-attacks-using-ai-powered-tools\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fending-off-ransomware-attacks-using-ai-powered-tools\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fending-off-ransomware-attacks-using-ai-powered-tools\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/f4efb40bab7f08bb3eee21abb7879d429caf491e\\\/2022\\\/02\\\/01\\\/55eea121-ad46-4a83-a47f-e07b861332eb\\\/cohesity-sign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/f4efb40bab7f08bb3eee21abb7879d429caf491e\\\/2022\\\/02\\\/01\\\/55eea121-ad46-4a83-a47f-e07b861332eb\\\/cohesity-sign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fending-off-ransomware-attacks-using-ai-powered-tools\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fending off ransomware attacks using AI-powered tools\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fending off ransomware attacks using AI-powered tools 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/fending-off-ransomware-attacks-using-ai-powered-tools\/","og_locale":"en_US","og_type":"article","og_title":"Fending off ransomware attacks using AI-powered tools 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/fending-off-ransomware-attacks-using-ai-powered-tools\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-02-01T22:16:32+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/f4efb40bab7f08bb3eee21abb7879d429caf491e\/2022\/02\/01\/55eea121-ad46-4a83-a47f-e07b861332eb\/cohesity-sign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/fending-off-ransomware-attacks-using-ai-powered-tools\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/fending-off-ransomware-attacks-using-ai-powered-tools\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Fending off ransomware attacks using AI-powered tools","datePublished":"2022-02-01T22:16:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fending-off-ransomware-attacks-using-ai-powered-tools\/"},"wordCount":976,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fending-off-ransomware-attacks-using-ai-powered-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/f4efb40bab7f08bb3eee21abb7879d429caf491e\/2022\/02\/01\/55eea121-ad46-4a83-a47f-e07b861332eb\/cohesity-sign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/fending-off-ransomware-attacks-using-ai-powered-tools\/","url":"https:\/\/www.threatshub.org\/blog\/fending-off-ransomware-attacks-using-ai-powered-tools\/","name":"Fending off ransomware attacks using AI-powered tools 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fending-off-ransomware-attacks-using-ai-powered-tools\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fending-off-ransomware-attacks-using-ai-powered-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/f4efb40bab7f08bb3eee21abb7879d429caf491e\/2022\/02\/01\/55eea121-ad46-4a83-a47f-e07b861332eb\/cohesity-sign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","datePublished":"2022-02-01T22:16:32+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/fending-off-ransomware-attacks-using-ai-powered-tools\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/fending-off-ransomware-attacks-using-ai-powered-tools\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/fending-off-ransomware-attacks-using-ai-powered-tools\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/f4efb40bab7f08bb3eee21abb7879d429caf491e\/2022\/02\/01\/55eea121-ad46-4a83-a47f-e07b861332eb\/cohesity-sign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/f4efb40bab7f08bb3eee21abb7879d429caf491e\/2022\/02\/01\/55eea121-ad46-4a83-a47f-e07b861332eb\/cohesity-sign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/fending-off-ransomware-attacks-using-ai-powered-tools\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Fending off ransomware attacks using AI-powered tools"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45099","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45099"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45099\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45099"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45099"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45099"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}