Cybercriminals often leak sensitive data from organizations. This data can be used in combination with ransomware to extort money from organizations or be sold to third parties. For example, stolen data can be found on illicit markets in the dark web. Tracking the information trail is important to understand how these markets operate.
Contact: Asier Moneva (firstname.lastname@example.org)
Lectoraat: Cybersecurity in the mkb