BloodHound versus Ransomware: A Defender’s Guide