Sherri Davidoff(@SherriDavidoff) 's Twitter Profile Photo

A cybercriminal group known as RansomHub has alleged that they are extorting Change Healthcare just a few weeks after they recovered from the ALPHV attack. The gang claims they have 4 TB of the company's , including sensitive PII. theregister.com/2024/04/08/cha…

account_circle
CYPFER(@Cypfer1) 's Twitter Profile Photo

πŸ›‘οΈ Stay Ahead in 2023's Cybersecurity Landscape with CYPFER! πŸ’ͺπŸ’» Discover the latest trends and strategies to combat cyber extortion attacks. πŸ”’

Read more: zurl.co/sGxp

πŸ›‘οΈ

πŸ›‘οΈ Stay Ahead in 2023's Cybersecurity Landscape with CYPFER! πŸ’ͺπŸ’» Discover the latest trends and strategies to combat cyber extortion attacks. πŸ”’

Read more: zurl.co/sGxp

#CyberSecurity #CyberExtortion #CYPFER #DigitalDefense πŸ›‘οΈ
account_circle
KoDDoS(@KoddosNET) 's Twitter Profile Photo

has surged to unseen levels, despite efforts
made to disrupt this form of .

The question arises:
what do current efforts to disrupt this ecosystem look like?

πŸ‘‰ To learn more, sign-up for Orange Cyberdefense upcoming webcast: ow.ly/yatx50QtYzM

#CyberExtortion has surged to unseen levels, despite efforts 
made to disrupt this form of #cybercrime. 

The question arises: 
what do current efforts to disrupt this ecosystem look like?

πŸ‘‰ To learn more, sign-up for @orangecyberdef upcoming webcast: ow.ly/yatx50QtYzM
account_circle
Ryan 'Chaps' Chapman(@rj_chap) 's Twitter Profile Photo

For those of you interested in and/or content, I just updated my website with my more recent content. You can find a ton of resources involving my presentations, workshops, podcasts, articles, and more at: incidentresponse.training.

For those of you interested in #ransomware and/or #cyberextortion content, I just updated my website with my more recent content. You can find a ton of resources involving my presentations, workshops, podcasts, articles, and more at: incidentresponse.training.
#cybersecurity
account_circle
Ryan 'Chaps' Chapman(@rj_chap) 's Twitter Profile Photo

It's about that time folks! We spent quite a bit of time perfecting this new SANS poster, and I couldn't be more proud of it. VERY excited to have it released soon!!! You can learn a ton about preventing, detecting, and hunting and actors using this!

account_circle
#AI(@AI__TECH) 's Twitter Profile Photo

Dutch police arrest three cyberextortion suspects who allegedly earned millions nakedsecurity.sophos.com/2023/02/27/dut…

Dutch police arrest three cyberextortion suspects who allegedly earned millions nakedsecurity.sophos.com/2023/02/27/dut… #infosec
account_circle
Ryan 'Chaps' Chapman(@rj_chap) 's Twitter Profile Photo

It's that time folks!! Our SANS DFIR and poster is officially out! Want to learn more about how to prevent, detect, and hunt for ransomware actors? Grab the poster! Sucks

account_circle
LMG Security(@LMGSecurity) 's Twitter Profile Photo

We're excited to share that LMG's Sherri Davidoff & Matt Durrin will run a Learning Lab at this year's RSA Conference! Attendees can reserve a seat for their tabletop exercise on & here: ow.ly/JXru50N7t4x

We're excited to share that LMG's @SherriDavidoff & @EvilMattXD will run a Learning Lab at this year's @RSAConference! Attendees can reserve a seat for their tabletop exercise on #ransomware & #cyberextortion here: ow.ly/JXru50N7t4x
#CISO #RSAC #DFIR
account_circle
Joel Aluko(@aluko_joel) 's Twitter Profile Photo

5.Cyberextortion (demanding money to prevent a threatened attack).
6.Ransomware attacks (a type of cyberextortion).
7.Cryptojacking (where hackers mine cryptocurrency using resources they do not own).
8.Cyberespionage (where hackers access government or company data).

5.Cyberextortion (demanding money to prevent a threatened attack).
6.Ransomware attacks (a type of cyberextortion).
7.Cryptojacking (where hackers mine cryptocurrency using resources they do not own).
8.Cyberespionage (where hackers access government or company data).
account_circle