• All
  • Cloud
    • Solutions
    • Virtualization
  • Data
    • Analytics
    • Big Data
    • Customer Data Platform
  • Digital
    • Digital Marketing
    • Social Media Marketing
  • Finance
    • Risk & Compliance
  • Human Resources
    • HR Solutions
    • Talent Management
  • IT Infra
    • App Management Solutions
    • Best Practices
    • Datacenter Solutions
    • Infra Solutions
    • Networking
    • Storage
    • Unified Communication
  • Mobility
  • Sales & Marketing
    • Customer Relationship Management
    • Sales Enablement
  • Security
  • Tech
    • Artificial Intelligence
    • Augmented Reality
    • Blockchain
    • Chatbots
    • Internet of Things
    • Machine Learning
    • Virtual Reality
  • All
  • Cloud
    • Solutions
    • Virtualization
  • Data
    • Analytics
    • Big Data
    • Customer Data Platform
  • Digital
    • Digital Marketing
    • Social Media Marketing
  • Finance
    • Cost Management
    • Risk & Compliance
  • Human Resources
    • HR Solutions
    • Talent Management
  • IT Infra
    • App Management Solutions
    • Best Practices
    • Datacenter Solutions
    • Infra Solutions
    • Networking
    • Storage
    • Unified Communication
  • Mobility
  • Sales & Marketing
    • Customer Relationship Management
    • Sales Enablement
  • Security
  • Tech
    • Artificial Intelligence
    • Augmented Reality
    • Blockchain
    • Chatbots
    • Internet of Things
    • Machine Learning
    • Virtual Reality
The 5 Most Dominant Threat Actors of 2023

The 5 Most Dominant Threat Actors of 2023

The ChannelPro Network
Published by: Research Desk Released: Apr 16, 2024

As we round out 2023, we’ve taken the time to look back on the most influential cyber adversaries this year. These five groups—BlackCat, LockBit, QakBot, Redline Stealer, and Akira—were top of mind, as they continue to dominate the space and innovate their methods in order to combat our most up-to-date countermeasures.

Recognizing these threat actors in the wild, with an understanding of:

  • how they work,
  • who they work with,
  • who they target, and
  • how they’ve evolved,

is key to instilling effective countermeasures that are targeted, adaptable, and resilient.

In this ebook you’ll learn:

  • How the top TTPs observed work
  • What to look out for regarding each threat actor
  • How to combat each group’s main TTPs
  • How Blackpoint has combatted them in the past

Welcome Dear

Thank you for your interest and your registration with Teradata. Please confirm your e-mail address to complete your registration by clicking here

Yes, confirm my

By confirming this, you give Teradata your consent to send you information on our data analytics products and services or invitations to events and webinars by e-mail from time to time. You can revoke this consent at any time by clicking on the unsubscribe link at the bottom of each of our e-mails. We assure you that we treat your contact details with the utmost care. Detailed information on how we store and use your personal data or how you can exercise your rights regarding your personal data can be found in the global Teradata Privacy Policy.