September Cymulate Threat Research Lab Update: Cuba Ransomware
Where did they come from? What are their tactics? What are the different defense layers you can put in place to reduce the risk of attack?
Join Cybersecurity architect Mike DeNapoli and Threat Intelligence Expert and Infosec Researcher Dan Lisichkin as they evaluate how these tools work, the phases of intrusion, the threat actor profile (who did it, motivations, origin, why they chose their targets), and how the attack propagated.
They’ll provide clear demonstrations of how we detected and replicated the attack propagation using the advanced capabilities of the Cymulate platform.