Cryptocurrency Fraud , Cybercrime , Fraud Management & Cybercrime

ISMG Editors: Decoding BlackCat Ransomware's Downtime Drama

Also: Fraud Trends; Cryptocurrency Regulatory Developments
Clockwise, from top left: Anna Delaney, Mathew Schwartz, Rashmi Ramesh and Suparna Goswami

In the latest weekly update, editors at Information Security Media Group discuss whether police have seized ransomware group Alphv/BlackCat's data leak site, how fraudsters are adapting their tactics and techniques to exploit advancements in technology, and which cryptocurrency stories have shaped the industry this year.

See Also: Corelight's Brian Dye on NDR's Role in Defeating Ransomware

The panelists - Anna Delaney, director, productions; Mathew Schwartz, executive editor of DataBreachToday & Europe; Rashmi Ramesh, assistant editor, global news desk; and Suparna Goswami, associate editor, ISMG Asia - discussed:

  • How we should interpret the recent disruption of ransomware group Alphv/BlackCat's online infrastructure by law enforcement and why defenders must employ unconventional methods to thwart future ransomware attacks;
  • The most significant fraud developments of 2023 and how fraudsters are adapting their tactics and techniques to exploit advancements in technology;
  • The cryptocurrency stories that have shaped 2023 and the regulatory developments we might see on the horizon.

The ISMG Editors' Panel runs weekly. Don't miss our previous installments, including the Dec. 1 edition on what the Sam Altman/OpenAI saga taught us and the Dec. 8 edition on ugly health data breach trends of 2023.


About the Author

Anna Delaney

Anna Delaney

Director, Productions, ISMG

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.