Circular Image

R.S. van Wegberg

4 records found

Decrypting Ransomware Operations

Exploring Ransomware Gangs’ Value Allocation for Effective Disruption Strategies

Ransomware attacks, orchestrated by cybercriminal organizations, pose a global threat in our digital era by exploiting system vulnerabilities and demanding ransoms for seized and encrypted data. Conti, a Russian ransomware group, ceased to exist after a 2022 data leak, offering a ...

Zero Trust Architecture

Design Principles for a Transformation towards a Perimeter-less Enterprise Architecture

Recent advances in the field of ‘Zero Trust’ security strategies have revealed that there is still much novelty regarding the concept of Zero Trust architecture (ZTA). Zero Trust has recently gained attention as the traditional approach, based on network perimeter security, is be ...

From Zero To Hero

Identifying Vendor Characteristics that Impact Vendor Performance on Darknet Markets

The thesis reconstructed and analysed transaction-level data of a particular darknet market. Moreover, the thesis reveals what kind of vendors are active on this darknet market, based on their characteristics. Finally, this research identified what the relative importance is of d ...