x

Please Sign-In to Access this Report

To access other reports on the platform please sign in with your username and password, or register for a free account to get unlimited access and insight customized for you.

  • Home
  • IT
  • Security
  • The Three Stages of Ransomware: Threat Spotlight Findings and Analysis
Webinar Barracuda

The Three Stages of Ransomware: Threat Spotlight Findings and Analysis

At this Threat Spotlight webinar, Barracuda CTO Fleming Shi and Senior Product Marketing Manager Stasia Hurley—our resident ransomware experts—will share the results of our latest research on new ransomware techniques.

Watch Webinar

Webinar Snap shot

Get filled in on the details of the three stages of modern ransomware attacks:

  • Sophisticated, evasive phishing emails that are used to harvest credentials
  • Application-layer attacks that use those credentials to access your apps—including, if possible, your backup system—and seek out valuable data, often by moving laterally within your network
  • Encryption and exfiltration of that data and the delivery of ransom demands