LIVE webinar

The rise of Leakware

Mattias Wåhlén | Rasmus Grönlund

Get to know all about Leakware

See webcast

By submitting your email adress you will be able to see the webcast as many times as you want.
  • Hidden
  • Hidden

Ransomware remains a hot topic but leakware is taking the stage by storm. Truesec has for a long time been battling data exfiltration as a secondary objective in relation to ransomware, and it is not a new occurrence.

However, exfiltration has commonly been the secondary, and not primary objective. This is where a notable shift in focus has started taking place, meaning that organizations need to adapt accordingly and protect what will be the most valuable assets of tomorrow.

Don’t miss this weeks Tech Talk with Truesec experts Rasmus Grönlund and Mattias Wåhlén.

Key learnings:

  • Insights into the latest trends of ransomware and leakware
  • Data exfiltration and leakware/ransomware attacks is nothing new, but there is a change in focus by the threat actors
  • Leakware changes the focus on protection and detection, where sensitive data and assets increase in priority compared to central infrastructure
  • Protecting a database or the laptop of the CEO increases in priority


Have a question you want to be answered during our Tech Talk? Email us at:



For whom:

Decision makers, Security managers, IT managers, IT technicians, IT professionals, and those of you who work in an IT department and who are interested in security issues.



Mattias Wåhlén

Mattias Wåhlén is Threat Intelligence Lead at Truesec. He heads our research into Threat Actors and their tactics, techniques and procedures (TTP).

Mattias interests include both the technical aspects and the human element in Threat intelligence and the understanding of Threat Actors and their operations.

Rasmus Grönlund

Rasmus is a security tester and one of Truesec lead forensic investigator. He specializes in how to protect and defend central organisational infrastructure.

His interests are in two different yet related sections. On one end, he enjoys forensic analysis and threat hunting. On the other end, he likes performing complex security tests for sensitive and high security environments.