Abstract "Double-extortion" ransomware attacks not only encrypt systems but also steal sensitive data. Traditional backups ...
Ransomware attackers are applying a significant focus on defense evasion tactics to increase dwell time in victim networks, according to a new report by Cisco Talos. This trend is a result of the ...
Security researchers from Radware have demonstrated techniques to exploit ChatGPT connections to third-party apps to turn ...
Data exfiltration is the movement or migration of company-owned trade secrets or intellectual property outside of the enterprise. It can either be unintentional or transacted with bad intent. The ...
Data loss prevention solutions have become an important tool in the chief information security officer’s toolbox with the rise in popularity of generative artificial intelligence in the enterprise.
SquareX researchers Jeswin Mathai and Audrey Adeline will be disclosing a new class of data exfiltration techniques at BSides San Francisco 2025. Titled “Data Splicing Attacks: Breaking Enterprise DLP ...
TL;DR Introduction Infostealers are not new malware. They have been around for decades. What has changed is how effective ...
SAN FRANCISCO--(BUSINESS WIRE)--BlackFog, the leader in ransomware prevention and anti data exfiltration (ADX), today launched its next-generation cybersecurity protection platform for macOS.
Cyber criminals are increasingly becoming more sophisticated in their methods of attack. Often we can equate this to the methods of data exfiltration as well. Exfiltration, or exportation, of data is ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results