CTERA Adds Data Exfiltration Prevention to Ransom Protect

CTERA enhanced Ransom Protect, with active protection vs. data exfiltration using honeypot techniques.

This addition bolsters enterprises’ defenses vs. insider threats and the latest extortion tactics employed by ransomware perpetrators.

Double extortion, a tactic that combines data exfiltration and encryption, has become a widespread method used by cybercriminals in ransomware attacks. Threat actors first exfiltrate sensitive information from their targets before launching the ransomware encryption routine, subsequently demanding a ransom payment to regain access to the encrypted assets and threatening to publicly expose the stolen data if the demand is not met promptly.

Read More…