24. May 2022

This article has been indexed from

Help Net Security

Cybercriminals often specialize. An extortion effort usually begins with a person or a team selecting targets in one of two ways: either they get a request from an extortionist or they just find their own victim to sell access to. Attackers pick victims who are likely to result in a good payout, and those are unfortunately the same ones buying products aimed at keeping the bad guys out. In this video for Help Net Security, … More

The post Taking the right approach to data extortion appeared first on Help Net Security.

Read the original article: