What Is Ransomware?
Types of Ransomware
Ransomware Timeline
SCRUTINIZE Why attacks of Ransomware cant be stopped or skyrocketing?
Module Progress of Ransomware from disk wiper, Extortion, double extortion to RaaS model.
Ransomware ATTACK LIFE CYCLE
Infection Vectors:- Phishing and Email Attachments ,Embedded Hyperlinks, Websites/downloads, and Drive-by Infections and how to stop/prevent with such attacks
Common Exploit Kits Are Used in Ransomware attacks
Techniques and tactics used by Ransomware group
Command and Callback (C&C) and Indicators of Compromise
Ransomware Responder
Defending / Detecting/ Containing an Ransomware Attack
Ransomware operations & technical task involved
Lessons Learned and Incident Response Plan
POST-ATTACK
Ransomware Victims companies names? Do some Google, web-scrapping & OSINT search for known and unknown names of companies.
Ransomware Attack Simulation and Adversary to follow during Ransomware attack
Helping organization for sanitization during Ransomware attack.
Recent Comments