AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Data Leakage and Ransomware Extortion Tactics
The chapter explores the tactics used by threat actors in data leakage and ransomware extortion schemes, highlighting the shift towards data extortion rather than traditional ransomware attacks. It discusses how threat actors leverage stolen data for extortion by pressuring victims with legal and financial consequences. The conversation also covers real-life scenarios of data exfiltration through cloud services and the importance of cloud security in detecting and countering these threats.