Countermeasures and observability key to defending against attackers trying to buy security products

The leak of Conti ransomware’s internal chat logs revealed the attackers tried to buy security software so they could figure out how to bypass it and avoid detection