Klijent: Akamai Technologies GmbH
Format: Bijela knjiga
Veličina: 3,2 MB
Jezik: Engleski
Datum: 17.05.2024

Ransomware on the Move

Evolving Exploitation Techniques and the Active Pursuit of Zero-Days
 
In the evolving ransomware landscape, adversaries are increasingly shifting from phishing to vulnerability exploitation, enhancing both the scope and sophistication of their attacks. Our previous report, "Slipping Through the Security Gaps," detailed this trend, highlighting how ransomware groups aggressively exploit vulnerabilities and use methods like in-house zero-day attack development and bug bounty programs. These groups are willing to invest financially, either by paying hackers to find flaws in their ransomware software or by purchasing access to targets through initial access brokers (IABs).
Besplatno preuzimanje
Unesite svoje kontaktne podatke i kliknite na dugme za preuzimanje. Dobit ćete poruku e-pošte s poveznicom za preuzimanje.
By clicking the button below, you consent to B2B Media Group GmbH with its affiliated companies and Akamai Technologies GmbH processing and storing your data for marketing purposes, in particular for marketing-related contact by e-mail and telephone.

You can revoke your consent at any time by sending an e-mail to unsubscribe@b2bmg.com (subject: Akamai Technologies GmbH). Further information can be found in the Privacy Notice.

Privacy / download conditions:

Date: 1.8.2018

Client

  • B2B Media Group GmbH, Bahnhofstraße 5, 91245 Simmelsdorf (B2B MG)

Partner

  • Akamai Technologies GmbH
Polja označena zvjezdicom * su obvezna