VMware

REAL Ransomware Chat Logs



|| Track down shady sellers, hunt for cybercrime, or manage threat intelligence and your exposed attack surface …

[ad_2]

source

Related Articles

26 Comments

  1. I mean these are the same companies that won't spend any money on security because some mba thinks it's an unnecessary expense and they have to hit quarterly kpi's and profits!

  2. Sad when the RAS OP has better communication skills and grammar than IT staff. Additionally, the number of IT staff that can't open the test files are nutty. 🤯

  3. If I encrypt my information (with windows Bitlocker for example ), does that deny hackers access to the plaintext on its face? I know they can just get the encryption key, but how much more difficult would it be?

  4. If companies would just invest in a real-time incremental backup, none of this sh*t would be happening. Got infected? No problem, just roll it back by a couple of hours to the encrypted data. Or have real-time monitoring software any encryption taking place in real time.

  5. I received such a threat. I told them to prove they had my information by telling me the address where I am located. Crickets… You can't just Google me and find me. I am off the grid.

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button