Abstract "Double-extortion" ransomware attacks not only encrypt systems but also steal sensitive data. Traditional backups ...
Data exfiltration is the movement or migration of company-owned trade secrets or intellectual property outside of the enterprise. It can either be unintentional or transacted with bad intent. The ...
Ransomware attackers are applying a significant focus on defense evasion tactics to increase dwell time in victim networks, according to a new report by Cisco Talos. This trend is a result of the ...
TL;DR Introduction Infostealers are not new malware. They have been around for decades. What has changed is how effective ...
Cyber criminals are increasingly becoming more sophisticated in their methods of attack. Often we can equate this to the methods of data exfiltration as well. Exfiltration, or exportation, of data is ...