In our three-point blog, we select articles, distil and comment on what we believe may be the three most interesting and relevant points for our clients.
- Paying a ransom won’t stop data publication: Infighting amongst criminal gangs is impacting post ransom behavior. Paying a ransom is less likely to end well, with data being released anyway.
- Attacks on the software supply chain: 2021 ended with the Log4j flaw. Threat actors may go after often forgotten source code in open-source software with the potential of impacting billions of devices.
- Quiet attacks: Threat actors are increasingly trying to infiltrate companies and go unnoticed for a long period.