Ransomware Trend: Double-Extortion Attacks

Logo
Presented by

Poul Frederiksen, Syya Yasotornrat

About this talk

In this ransomware battleground, we are looking into double-extortion attacks. What are they? And how do they get triggered? Hackers first extract large amounts of sensitive data prior to encrypting a victim’s databases. Then they threaten to publish the data unless the victim pays ransom demands. This puts extra pressure on organizations to pay up. With these bigger attacks coming in 2021, the adversary has targeted the organization or the government department. How do you defend against this type of attack? Join this podcast with Syya and our elite cybersecurity guest to spot the IOCs and know-how Zero Trust Isolation can help in your defense.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (88)
Subscribers (1840)
Ransomware attacks and threats are growing exponentially. While many security companies are trying to prevent ransomware from breaching the perimeter of your network, Airgap's Zero Trust Isolation Platform protects your organization from the inside out. Additionally, Airgap’s Ransomware Kill Switch is the most potent ransomware response for an IT organization. The solution can be deployed in minutes without any endpoint agents, forklift upgrades, or design changes. Airgap was founded by highly experienced cybersecurity experts and the solution is trusted by large enterprises and service providers. For more details, check out https://airgap.io or email media@airgap.io