클라이언트: Akamai Technologies GmbH
양식: 백서
크기: 3.2MB
언어: 영어
날짜: 17.05.2024

Ransomware on the Move

Evolving Exploitation Techniques and the Active Pursuit of Zero-Days
 
In the evolving ransomware landscape, adversaries are increasingly shifting from phishing to vulnerability exploitation, enhancing both the scope and sophistication of their attacks. Our previous report, "Slipping Through the Security Gaps," detailed this trend, highlighting how ransomware groups aggressively exploit vulnerabilities and use methods like in-house zero-day attack development and bug bounty programs. These groups are willing to invest financially, either by paying hackers to find flaws in their ransomware software or by purchasing access to targets through initial access brokers (IABs).
무료 다운로드
연락처 정보를 입력하고 다운로드 버튼을 클릭하십시오. 다운로드 링크가 포함된 이메일이 발송됩니다.
By clicking the button below, you consent to B2B Media Group GmbH with its affiliated companies and Akamai Technologies GmbH processing and storing your data for marketing purposes, in particular for marketing-related contact by e-mail and telephone.

You can revoke your consent at any time by sending an e-mail to unsubscribe@b2bmg.com (subject: Akamai Technologies GmbH). Further information can be found in the Privacy Notice.

Privacy / download conditions:

Date: 1.8.2018

Client

  • B2B Media Group GmbH, Bahnhofstraße 5, 91245 Simmelsdorf (B2B MG)

Partner

  • Akamai Technologies GmbH
* 표시된 영역은 필수입니다