Prevention
- Security Assessment
- Red Teaming
- Compliance Audit
- Pre-IR Assessment
- Compromise Assessment
- Cyber Education
- GIB Crypto
The year 2020 was a difficult one for most people around the world, but the same cannot be said for ransomware groups. While industries and businesses struggled to adapt to a post-pandemic reality, threat actors thrived, attacking bigger targets and demanding more money.
Ransomware-as-a-Service programs began to appear more frequently on underground forums, data exfiltration became an increasingly popular tactic among ransomware operators, and enterprise ransomware operations expanded to include new (and potentially game-changing) participants.
To stand a chance against threat actors in 2021, it is vital to not only understand their latest tactics, techniques, and procedures but also what actions to take to protect against them. Ransomware Uncovered 2020/2021 will give readers an intimate look at each step threat actors take, from initial access to exfiltration.
35% of attacks in 2020 were conducted by Maze and its successor Egregor.
It has become normal to see ransom demands in the millions of dollars.
State-sponsored threat actors and commodity malware are more actively becoming associated with ransomware operations.
Explore the newest heat map of ransomware operators’ TTPs
Read predictions on how threat actors will act in the coming year
Get tailored lists of mitigations for each tactic and technique
Comprehensive solution to protect corporate network, hunt for threats and respond to even the most complex cyber attacks
Proactively identify suspicious activity and uncover threats before they can damage your environment
Pre-negotiated statement of work to provide a synergy of proactive and reactive services related to a security inciden
Evaluate your IR team and prepare for effective response to stop the cyber security incident within the shortest time