From Encryption to Erasure: Understanding Wiper Cyber Attacks
In today’s bulletin, Charlie gives an insight into wiper attacks and how these differ from traditional ransomware cyber attacks, and advises how organisations can protect themselves from these attacks. This week, I have been working on a case study of the Stryker Corporation cyber attack, which was of interest to me as it is collateral damage from the