Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    AMD surges 10 percent in desktop PC share, again

    Google now lets you delete your personal info from search results

    Microsoft just forked Windows

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026
    • Business

      The HDD brand that brought you the 1.8-inch, 2.5-inch, and 3.5-inch hard drives is now back with a $19 pocket-sized personal cloud for your smartphones

      February 12, 2026

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025
    • Crypto

      Berachain Jumps 150% as Strategic Pivot Lifts BERA

      February 12, 2026

      Tom Lee’s BitMine (BMNR) Stock Faces Cost-Basis Risk — Price Breakdown at 10%?

      February 12, 2026

      Why the US Jobs Data Makes a Worrying Case for Bitcoin

      February 12, 2026

      MYX Falls Below $5 as Short Sellers Take Control — 42% Decline Risk Emerges

      February 12, 2026

      Solana Pins Its $75 Support on Short-Term Buyers — Can Price Survive This Risky Setup?

      February 12, 2026
    • Technology

      AMD surges 10 percent in desktop PC share, again

      February 12, 2026

      Google now lets you delete your personal info from search results

      February 12, 2026

      Microsoft just forked Windows

      February 12, 2026

      This Lenovo USB-C dock with 65 watts of power is just $76

      February 12, 2026

      Anker’s USB-C hub turns 1 laptop port into 8 ports (best ever price)

      February 12, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Ransomware resilience: It’s time to be ‘more Bruce Lee’
    Technology

    Ransomware resilience: It’s time to be ‘more Bruce Lee’

    TechAiVerseBy TechAiVerseNovember 1, 2025No Comments5 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Ransomware resilience: It’s time to be ‘more Bruce Lee’
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Ransomware resilience: It’s time to be ‘more Bruce Lee’

    beebright – stock.adobe.com

    The growing threat of ransomware attacks requires cyber to evolve from a defensive posture to being increasingly proactive. Building threat intel can enable this, helping better predict, prioritise and prevent ransomware attacks.

    By

    • Jason Steer, CISO, Recorded Future

    Published: 31 Oct 2025

    I don’t imagine there are many CISOs who use Bruce Lee as a point of reference for enhancing cyber security strategies? However, the philosophy of his hybrid martial art – Jeet Kune Do – is based on many principles relevant for staying ahead of ransomware hackers.

    The UK’s National Crime Agency recently highlighted how the ransomware landscape has entered a post-trust ecosystem. This refers to a more unpredictable and dangerous threat landscape, and an environment that’s interconnected. Nothing appears off limits for cyber criminals. They are willing to push the boundaries of innovation, experimentation and collaboration to stay ahead of law enforcement agencies and to remaster ransomware attacks that force victims into coercion.

    A recent ‘strategic alliance’ between three ransomware groups – DragonForce, LockBit and Qilin – epitomises how the ecosystem is changing and adapting. The Hacker News reported their coalition aims to share techniques, resources and infrastructure to strengthen overall capabilities. Moves such as this show a level of interconnectivity and evolution in the creation and deployment of ransomware threats, which requires organisations to be more alert and informed. This is where the principles of Jeet Kune Do apply. 

    Enter The Dragon

    Bruce Lee based Jeet Kune Do on a philosophy which advocates practices of absorbing what is useful, discarding what is not, engaging in directness and simplicity to effectively and quickly end confrontation, and perhaps most importantly, the martial art’s core tenet of ‘the way of the intercepting fist’. It’s a style of martial arts crafted to neutralise an attack through a simultaneous defensive and offensive move. So, how does this apply to ransomware mitigation?     

    Many forward-thinking organisations have invested in robust cyber security defences. However, ransomware attacks are successful because their perpetrators are able to establish entry into organisations via a multitude of ways, making it harder for security teams to detect and monitor every possible entry point. Every security team is overwhelmed with monitoring; tuning and prioritising directions is an endless balance of noise to signal ratio. Essentially, can I observe every possible attack? And at what stage would I like to detect? Knowing earlier can help lessen impact but creates more alerts to review. It’s a dilemma.

    Hackers are constantly putting organisations under the microscope, scrutinising how they build defences and knowledge building to inform their attack techniques. Cyber security teams must adopt the same level of observation and scrutiny by proactively monitoring the threats they face.

    Cyber threat intelligence can enable organisations to better understand ever-shifting ransomware threats. Sophisticated vulnerability and attack surface intelligence will analyse billions of data points from across the open and dark webs, and technical sources, providing a comprehensive external view of the vulnerabilities, misconfigurations and other exposures that are in the most urgent need of review and potential remediation. This approach is the Jeet Kune Do principle of absorbing what is useful and discarding what is not, allowing organisations to prioritise the highest-risk threats. 

    The GCHQ’s National Cyber Security Centre (NCSC) reported that the UK experienced four nationally significant cyber attacks every week in the year to September 2025. This is a snapshot of the escalating and relentless level of threat that organisations face, and not all threats are equal. Some risks pose a more immediate danger, meaning today’s cybersecurity strategies should have actionable and fresh intelligence to prioritise detection, remediation or mitigation, to ensure defences work as expected.

    Anticipating attacks

    Ransomware tools, techniques and tactics don’t stand still. Threat actors are leveraging the new possibilities of artificial intelligence (AI), finding earlier points of entry in supply chains for exploitation and refining social engineering and phishing to make attacks harder to predict. Cyber threat intelligence can enable organisations to keep pace with these developments, providing business-critical insight about the; what, why, when and how of threat actor behaviour.

    Identity intelligence, for example, can enable organisations to effectively monitor for compromised employee credentials, analysing exposed credentials in near real-time across the dark web, forums, paste sites, criminal marketplaces and bot infrastructure. Passwords and trusted access details gained from social engineering can be detected and actioned before attackers weaponise them as a gateway for ransomware deployment. It’s a level of proactivity that reflects the Jeet Kune Do principle of engaging in directness and simplicity to effectively end confrontation.

    Building knowledge of ransomware threats creates the ability and opportunity for organisations to ‘intercept the fist’ before an attacker strikes. Cyber threat intelligence can help teams to efficiently capture, compile, and analyse threat data, turning it into actionable insights across all the key components of a cybersecurity programme – people, processes, products and policies. All these factors can be informed by a real-world view of what hackers are doing, unlocking the potential to better predict, prioritise and prevent ransomware attacks. Being defensive alone won’t achieve this.

    Jason Steer is chief information security officer at Recorded Future.

    Read more on Hackers and cybercrime prevention


    • What is cyber extortion?

      By: Alexander Gillis


    • UK and Singapore to collaborate on supporting ransomware victims

      By: Alex Scroxton


    • NCSC says AI will increase ransomware, cyberthreats

      By: Arielle Waldman


    • AI will heighten global ransomware threat, says NCSC

      By: Alex Scroxton

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleWhy asset visibility matters in industrial cyber security
    Next Article Cyber agencies co-sign Exchange Server security guide
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    AMD surges 10 percent in desktop PC share, again

    February 12, 2026

    Google now lets you delete your personal info from search results

    February 12, 2026

    Microsoft just forked Windows

    February 12, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025667 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025255 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025152 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025111 Views
    Don't Miss
    Technology February 12, 2026

    AMD surges 10 percent in desktop PC share, again

    AMD surges 10 percent in desktop PC share, again Image: Adam Patrick Murray / Foundry…

    Google now lets you delete your personal info from search results

    Microsoft just forked Windows

    This Lenovo USB-C dock with 65 watts of power is just $76

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    AMD surges 10 percent in desktop PC share, again

    February 12, 20263 Views

    Google now lets you delete your personal info from search results

    February 12, 20263 Views

    Microsoft just forked Windows

    February 12, 20263 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.