From Ransomware to Leakware

Presented by

Ira Winkler, Security Evangelist & Nir Gaist, Founder/CTO

About this talk

Just like legitimate businesses adapt, transform and innovate, cybercriminals behind major strains of ransomware are updating their business model. Ransomware crooks are no longer just scrambling your data and demanding you to pay up to get it back. They’re upping the ante by stealing your data first and only then encrypting it. That way the criminals hit you with two reasons to pay: buy back the decryption key AND prevent us from telling the world we hacked you (or selling your data to the highest bidder). Join our webinar to learn about the history of this transformation, hear the latest examples of organizations affected by this type of leakware (aka doxware) and see a live demo of exfiltration-enabled ransomware.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (7)
Subscribers (2835)
Nyotron pioneers a new generation of automatic Endpoint Detection and Response with integrated protection called Endpoint Prevention and Response (EPR). Our product prevents damage from malware that evades existing security layers and offers granular visibility into the attack. Based on the OS-Centric Positive Security, Nyotron's PARANOID automatically whitelists trusted operating system behavior and rejects everything else. No manual threat hunting, baselining, machine learning or cloud connectivity required. With PARANOID organizations gain true defense-in-depth protection against the most advanced attacks. Nyotron is headquartered in Santa Clara, CA with an R&D office in Israel. To learn more, visit