Data Exfiltration 101: How Threat Actors Compromise Networks
Data exfiltration 101 describes the types of attacks that lead to data exfiltration and why 83% of all attacks rely on it as the primary vector.
Data exfiltration 101 describes the types of attacks that lead to data exfiltration and why 83% of all attacks rely on it as the primary vector.
Ransomware groups are using increasingly sophisticated technology and infrastructure to carry out attacks while adopting new tactics to pressurize their victims such as recruiting your employees.
The cybercrime landscape is changing, and ransomware group tactics are shifting accordingly On January 14th, 2022, Russian authorities announced they had dismantled REvil, the aggressive ransomware groups that made headlines after successfully attacking Colonial Pipeline. Several of its leading members were arrested in a large-scale operation that took place over [...]
Industrialized cybercrime, critical infrastructure attacks and sky-high ransoms are just the beginning of ransomware as a service business models.
Former Police Captain and Commander for the Grand Rapids, MI Police Department to support forensic investigations for anti data exfiltration leader.
BlackFog recognized with gold and bronze awards in four categories in the 2022 Cybersecurity Excellence Awards.
BlackFog Launches Virtual CISO Offering and continues expansion with new service offering fully managed fractional CISO expertise.
Where traditional Endpoint Security relies on sensitive data matching algorithms, Anti Data Exfiltration uses a more sophisticated approach and monitors outbound traffic on endpoints, and restricts data from leaving the network.
In 2020 and 2021 BlackFog measured publicly disclosed attacks globally. The 2021 ransomware attack report summarizes these findings and highlights the key trends as we enter 2022.
BlackFog News 2022