Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date When Employees Depart: Ensuring Access to Sensitive Data is Removed Kale Bogdanovs & Rob Frase When employees leave your organization, how sure are you that they are actually gone? It’s easy to deactivate in AD or SSO, but that doesn’t percolat... 1 week ago | 22 mins Unveiling the Darknet's Malware-as-a-Service model Alexander Zabrovsky, Digital Footprint Analyst at Kaspersky Not only do cybercriminals make money by committing cybercrime, but they also expand their operations by offering services to individuals without stro... June 20, 2023 2:00pm ToddyCat: an overview of a new APT group Giampaolo Dedola ToddyCat is a relatively new advanced persistent threat (APT) actor that came to prominence in late 2020, and has been expanding – both technologicall... June 27, 2023 5:00am Defending Against Supply Chain Attacks Corey O'Connor, Product Marketing Manager, DoControl A software supply chain attack targets the software development process, with the intent of introducing malicious code into “trusted” software package... June 21, 2023 5:00pm GPS Live: Blank Images | Hive Malware Backdoor | Third-party Data Breach Jonathan Singer, SEIM & SOAR Practice Lead and Tristan Morris, Cybersecurity Solutions Marketer with GuidePoint Security Jonathan Singer, SEIM & SOAR Practice Lead and Tristan Morris, Cybersecurity Solutions Marketer with GuidePoint Security discuss blank images, a new H... 4 months ago | 33 mins BPFDoor and So Much More: An Analysis of Linux Network Passive Backdoors Nicole Carignan, CounterCraft, Customer Success Manager, and David Barroso, CounterCraft, CEO Passive backdoors are implants designed to be stealthier than common backdoors, especially by avoiding listening on ports or pinging back to a Command... 6 months ago | 48 mins Software Supply Chain: Backdoors to your application hiding in plain sight Eran Orzel, Co-Founder, Argon an Aqua Security Company Supply chain attacks have been the trending topic of the year. But how are attackers actually breaching software supply chains? What is the real sour... 11 months ago | 45 mins Three NEW Ransomware Exploits - How to Close the Backdoor George Crump, StorONE CMO Ransomware attacks are now using three new exploits to force you into paying the ransom. Bad actors know that you will resort to your backups in respo... 1 year ago | 38 mins Closing the Backdoor: Reverse Engineering SUNBURST Mandiant FLARE Experts At the end of 2020, FireEye revealed the details of a sophisticated threat actor that took advantage of SolarWinds’ Orion Platform to orchestrate a wi... 2 years ago | 61 mins Lessons from SUNBURST: Closing the backdoor Rishi Sharma, Senior Systems Engineer, Mandiant and Narayan Arkshali, Channel Account Manager, Mandiant A sophisticated threat actor took advantage of SolarWinds’ Orion Platform to orchestrate a wide-scale supply chain attack and deploy a backdoor we cal... 1 year ago | 40 mins Load more