
2020 Cybersecurity Landscape: 100+ Experts’ Predictions
Cyber Security Predictions 2021: Experts’ Responses
Experts’ Responses: Cyber Security Predictions 2023
Celebrating Data Privacy Day – 28th January 2023
Data Privacy Protection Day (Thursday 28th) – Experts Comments
Information Security Buzz (aka ISBuzz News) is an independent resource that provides the experts comments, analysis and opinion on the latest Information Security news and topics
<p>For opportunistic cybercriminals, secondary extortion is the name of the game. The nature of ransomware attacks has quickly evolved and organisations experiencing the damage and impact first hand. In secondary extortion attacks, criminals quietly steal sensitive information from a victim, incrementally gathering leverage. They then use the stolen data to force organisations to not only pay to decrypt their content, but also prevent potentially harmful data from being sold or otherwise publicly disclosed.</p> <p> </p> <p>The ransomware group was able to steal the full source code for not only Cyberpunk 2077, but also the organisation’s other wildly popular game, The Witcher 3 and related content. This is data that not only compromises everything the company has worked on for over a decade, but also drew significant concern around what they planned to do with the stolen data. In these situations, even if the company pays the ransom, and pays them to not publicly share the source code, there really is nothing stopping the attackers from selling the source code directly, especially considering the significant dollar value this could bring in. Secondary extortion is an opportunity for cybercriminals to cash in and profit from attacks in multiple ways.</p>