Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Threat Alert: New Babuk Ransomware Discovered Nadav Lorber, Security Research Team Lead Morphisec has discovered a brand-new variant of Babuk ransomware. The new variant uses the Babuk ransomware source code leaked on Russian language hac... 6 days ago | 29 mins Threat Alert: New Babuk Ransomware Discovered Nadav Lorber, Security Research Team Lead Morphisec has discovered a brand-new variant of Babuk ransomware. The new variant uses the Babuk ransomware source code leaked on Russian language hac... 3 weeks ago | 29 mins Protecting Your Microsoft 365 Environment from BEC and More Brian Stockbrugger, Cloud Solutions Architect, Microsoft and Arun Singh, VP Product Marketing, Abnormal Security Business email compromise is still the leading threat to organizations, and traditional tools simply can’t stop these attacks. Cyberattacks are becomi... 3 months ago | 52 mins Use Cases in Breach Analytics: A Panel Discussion with Mandiant and Google Tim Crothers, SVP, CSO, Mandiant; Sharat Ganesh, Prod Marketing Leader, Google; Matt Shelton, Dir, Tech Risk & Tl, Mandiant From the CISO to the security analyst, security practitioners do not want to be the last to know when their environment is compromised. Leveraging bre... 4 months ago | 25 mins 멘디언트 침해 진단 서비스 - Mandiant Compromise Assessment Ryangho Kang 고객사에서 현재 진행 중이거나 이전에 발생한 공격자 활동 식별 서비스 소개 : Mandiant 침해 진단 서비스는 지능형 위협 범죄자, 업계 최고의 위협 인텔리전스 및 FireEye 기술을 통해 시행되는 침입에 대응하는 포괄적인 경험을 결합하여 현재 진행 중인 침입이나... 2 years ago | 19 mins Compromise Assessment with Mandiant: Why You Need It Today Mike Trevett, Director, Mandiant Services EMEA & Mitch Clarke, Principal Consultant, Mandiant Services EMEA. Today’s threat actors are gaining in sophistication and motivation, and have greater opportunities to launch attacks with widespread enterprise cloud ... 2 years ago | 47 mins Ransomware and BEC in the Cyber Threat Landscape Crane Hassold, Director of Threat Intelligence, Abnormal Security Colonial Pipeline. CNA Financial. Quanta. Even the NBA. Hardly a week goes by without a ransomware story hitting the news, as organizations worldwide ... 12 months ago | 61 mins Verizon Threat Research Advisory Center MIB: Espionage Motivated Data Breaches John Grim, Dave Kennedy Espionage data varieties include Internal, Secrets, Credentials, and Classified. Protecting this data can be a challenge. The sheer size of an enterpr... 1 year ago | 78 mins Is Your Secure Email Gateway Really Necessary? Hunter Hogan, Digital Technical Specialist, Microsoft & Arun Singh, VP of Product Marketing, Abnormal Security Your secure email gateway (SEG) never stood a chance. Socially-engineered attacks are the largest security threat, and with the rise of modern attacks... 9 months ago | 63 mins CISO Strategy: Monitor the Breathe Dr. Onkar Nath, Information Security Strategist 2020 was the year of pandemic and testing immunity of human race. It has also exposed our bookish risk assessment and risk treatment processes. 2021 i... 2 years ago | 43 mins Load more