Gone are the days of 2016 when we saw 12 million ransomware attachments randomly blasted out per day. It’s 2021 now, when threat actors selectively deploy ransomware against high value targets across the victim organization’s entire network in order to secure initial access.
Why is initial access so often overlooked in protecting against the multiplicity of ransomware threats?
In the inaugural episode of our Threat Digest series, series hosts Selena Larson and Crista Giering, Senior Threat Intelligence Analysts at Proofpoint, interview Daniel Blackford, Senior Threat Researcher at Proofpoint, about initial access and what can happen afterwards.
Join us as we discuss:
The evolution of ecrime in the past five years
Initial access, dwell time, and the prevalence of Cobalt Strike activity
What white glove ransomware treatment is like
Tips for protecting your org against multiple malign actors at various stages of an attack
Check out the report we mentioned during the podcast:
-The First Step: Initial Access Leads to Ransomware
For more episodes like this one, subscribe to us on Apple Podcasts, Spotify, and the Proofpoint website, or just search for Protecting People in your favorite podcast player.
Listening on a desktop & can’t see the links? Just search for Protecting People in your favorite podcast player.