Ransomware survives your backup jobs. We show you how. Then we fix it.
August 1 to 6, 2026 | Business Hall: August 5 to 6
Mandalay Bay Convention Center, Las Vegas, NV
Elastio is at Black Hat USA with a live demonstration of ransomware persistence inside cloud backup data, and a platform that hunts for it before recovery begins.
At Black Hat, we run a technical demonstration that the security research audience here expects: a real ransomware family, a real cloud backup environment, a real infection timeline.
The demonstration covers
How the ransomware variant entered the environment and survived backup.
The file-level evidence of what was infected and when.
How Elastio identifies the threat inside the backup without triggering the payload.
The last provably clean recovery point with a timestamp.
Restore verification confirming the recovered environment is clean.
A note on the technical approach
Elastio does not rely on signature matching or known-threat databases as its primary detection mechanism.
Detection operates at the file content level across the full data surface: live data, replicated data, and backup data.
We discuss the technical architecture privately with teams who want to understand how it works.
Who should visit us at the Business Hall
Security researchers and practitioners working on ransomware detection and recovery.
CISOs and security architects evaluating cloud backup as a threat surface.
Incident response leads who have dealt with ransomware reactivation during recovery.
Red team and threat intelligence professionals interested in backup persistence techniques.
The demonstration takes 25 minutes. We also have technical sessions available for deeper architecture conversations.
Elastio assessments run directly against your cloud backup environment on AWS, Azure, or IBM Cloud. You receive a timestamped report showing what is clean, what is at risk, and what your provable recovery point is.
Assess Your Recovery Posture