2 months ago0 viewscyber-securityextortiontechnologyA detailed explanation of the data extortion tactics used by the Anubis Group in the context of cyber-security.