Ransomware on the Move

Evolving Exploitation Techniques and the Active Pursuit of Zero-Days
 
In the evolving ransomware landscape, adversaries are increasingly shifting from phishing to vulnerability exploitation, enhancing both the scope and sophistication of their attacks. Our previous report, "Slipping Through the Security Gaps," detailed this trend, highlighting how ransomware groups aggressively exploit vulnerabilities and use methods like in-house zero-day attack development and bug bounty programs. These groups are willing to invest financially, either by paying hackers to find flaws in their ransomware software or by purchasing access to targets through initial access brokers (IABs).

Доставчик: Akamai Technologies GmbH   |   Размер: 3 МБ   |   Език: Английски