Alerts
Events
DCR
Explore Cyware Products
Alerts
Events
DCR
Go to listing page
The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs
Trends, Reports, Analysis
June 24, 2022
Securelist
Ransomware attacks go through certain stages, such as penetrating the corporate network or victim’s computer, delivering malware, further discovery, account hijacking, deleting shadow copies, removing backups and, finally, achieving their objectives.
Read More
Ransomware Operators
Pysa
Cl0p
LockBit 2.0
RagnarLocker
Publisher
Previous
Malicious Cyber Actors Continue to Exploit Log4Shell in ...
Threat Intel & Info Sharing
Next
New 'Quantum' Builder Lets Attackers Easily Create Mali ...
Malware and Vulnerabilities