Go To Home

The Top 40 Ransomware Techniques and How to Mess With Them

Ransomware Techniques by Smokescreen

Inside You’ll Find

The top 40 ransomware techniques that you are most likely to encounter and how to defend against them using active defense and deception.

  • Understand how you can combine active defense and deception techniques to counter ransomware.
  • Find out what techniques ransomware uses at different stages of the attack, from initial infection to encryption.
  • Learn what active defense and deception options you have to either slow the spread or limit the impact of ransomware.
  • A mapping of each ransomware technique to MITRE Shield techniques to help you operationalise the playbook.

Grab Your Copy

Go to home

Simple solutions for detecting and containing threats. Working with us does not break the bank or your spirit. We’re the company of choice for offensive security teams with a Net Promoter Score of 70+.

© 2015-2021 Smokescreen. All rights reserved.

Solutions For
Web Application AttacksLateral MovementRansomware AttacksTargeted ThreatsSocial EngineeringMalware-less Attacks