The MITRE ATT&CK Framework: Exfiltration

Once an attacker has established access and pivoted around to the point of gathering the necessary data, they will work on exfiltration of that data. Not all malware will reach this stage. Ransomware, for example, usually has no interest in exfiltratin… Continue reading The MITRE ATT&CK Framework: Exfiltration

How to prevent a virus from stealing data when I transfer files between offline and online computers?

Let’s say I have one offline computer with some important data, and one online computer. Sometimes I need to move files from the offline computer to the online one. When I transfer those files, is there a risk that a virus wo… Continue reading How to prevent a virus from stealing data when I transfer files between offline and online computers?