article thumbnail

Case Study: A REvil Ransom Negotiation

Data Breach Today

Security Firm Elliptic Illustrates How Group Was Willing to Reduce Its Demands The blockchain analysis firm Elliptic offers a step-by-step case study, based on its research, of how one victim of the REvil ransomware gang negotiated a lower ransom payment.

article thumbnail

Announcing the new RM Case Studies series

The Schedule

SAA’s Records Management Section is excited to announce the launching of a new peer-reviewed case study series under the umbrella of SAA Publications. Suggested case study length is 2,500 to 5,000 words. All members of the RIM community are welcome to submit case studies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Rise of Surveillance States

Data Breach Today

In this discussion of their RSA Conference keynote, Niloo Howe and David Cole share their research, case studies and analysis. Niloo Howe and David Cole on the Impact of Pandemic and Protests on Privacy The COVID-19 pandemic created unique conditions for technology and surveillance practices to erode global privacy.

Privacy 284
article thumbnail

Malicious PDF Analysis

Security Affairs

In the last few days I have done some analysis on malicious documents, especially PDF. Then I thought, “Why not turn a PDF analysis into an article?” SecurityAffairs – PDF analysis, hacking). The post Malicious PDF Analysis appeared first on Security Affairs. About the author : Zoziel Freire.

article thumbnail

How to Package and Price Embedded Analytics

Just by embedding analytics, application owners can charge 24% more for their product. How much value could you add? This framework explains how application enhancements can extend your product offerings. Brought to you by Logi Analytics.

article thumbnail

Analysis: A Better Approach to Cyber Defense

Data Breach Today

Plus, a case study on cross-border payment fraud, and an expert's take on security for the 2020 elections. The latest edition of the ISMG Security Report discusses why cyber defense teams need to think more like attackers.

Security 113
article thumbnail

Hunting down Gooligan — retrospective analysis

Elie

Beside its scale what makes Gooligan a worthwhile case-study is its heavy reliance on stolen oauth tokens to attack Google Play’s API, an approach previously unheard of in malware. This talk starts by providing an in-depth analysis of how Gooligan’s kill-chain works from infection and exploitation to system-wide compromise.

IT 59