Stop the Attack Cycle: Play Ransomware, Phishing, and the Power of MFA
CISO Insights: Voices in Cybersecurity

Stop the Attack Cycle: Play Ransomware, Phishing, and the Power of MFA

2025-10-04
Ransomware groups, such as Play (also known as Playcrypt), were among the most active groups in 2024 and use advanced methods like double extortion, first exfiltrating data and then encrypting systems, often targeting critical infrastructure globally. Initial access frequently begins with human elements, as phishing remains the top entry point for malware and compromised credentials, which are then used by threat actors leveraging tools like Mimikatz or Cobalt Strike for lateral movement. To reduce the risk of compromise, organizations are urged to apply cyber hygiene essentials:...
View more
Comments (3)

More Episodes

All Episodes>>

Get this podcast on your phone, Free

Create Your Podcast In Minutes

  • Full-featured podcast site
  • Unlimited storage and bandwidth
  • Comprehensive podcast stats
  • Distribute to Apple Podcasts, Spotify, and more
  • Make money with your podcast
Get Started
It is Free