
A Human at the Keyboard: CrowdStrike Reports 60% Jump in Interactive Intrusions
Adversary Universe Podcast
00:00
Data Leakage and Ransomware Extortion Tactics
The chapter explores the tactics used by threat actors in data leakage and ransomware extortion schemes, highlighting the shift towards data extortion rather than traditional ransomware attacks. It discusses how threat actors leverage stolen data for extortion by pressuring victims with legal and financial consequences. The conversation also covers real-life scenarios of data exfiltration through cloud services and the importance of cloud security in detecting and countering these threats.
Play episode from 16:11
Transcript


