Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Discover and Remediate Domain Credential Exposures Rinat Villeval Phishing attacks are proving to be the most successful attack method of 2022. And the one thing they all have in common is leveraging abused Domain Cr... 2 days ago | 25 mins DNS Security Risks and Systems: AN OPEN DEMO Peter LaMantia, Founder and CEO Phishing, malware, and credential theft are top cyber threats. Corporations spend millions to mitigate exposures, yet compromises continue to damage ... 2 days ago | 21 mins Cyber Notes Cast - Concepts of Federated Identity Management senhasegura Federated identity management enables authorized users to access multiple platforms using a single set of credentials. In the past, each website or a... June 12, 2023 3:00pm Discover and Remediate Domain Credential Exposures Rinat Villeval Phishing attacks are proving to be the most successful attack method of 2022. And the one thing they all have in common is leveraging abused Domain Cr... 2 months ago | 25 mins Navigating the Automotive Cybersecurity Domain Kaivan Karimi, Microsoft | Amy Chu, Device Authority This webinar offers Microsoft's perspective on the ever evolving nature of automotive cybersecurity and the measures taken to ensure safer and more se... June 20, 2023 5:00pm Discover and Remediate Domain Credential Exposures Rinat Villeval Phishing attacks are proving to be the most successful attack method of 2022. And the one thing they all have in common is leveraging abused Domain Cr... 4 months ago | 25 mins Tracking The Cyber-Geography in The Russia Ukraine Conflict Paul Mockapetris, Chief Scientist at ThreatSTOP Cyberattacks are becoming increasingly harmful and more difficult to distinguish legitimate from nefarious correspondence. “Safe” IP space can be hija... 1 week ago | 4 mins PKI Meets Red Team: Revealing Common Microsoft AD CS Misconfigurations Ted Shorter, CTO, Chris Hickman, CSO, Lee Christensen, Technical Architect, & Will Schroeder, Technical Architect Microsoft Active Directory (AD) PKI is widely used by enterprises today, yet it has largely flown under the radar of attackers and defenders – until n... 4 months ago | 46 mins Off The Record: RedAlpha Conducts Multi-Year Credential Theft Campaign - Part 3 Jon Condra, Director of the Strategic and Persistent Threats team at Recorded Future Part 3 of 3-part series Off The Record: Recorded Future observes Chinese state-sponsored cyber-espionage and surveillance campaigns, likely from Red ... 8 months ago | 45 mins [Podcast] Mozi arrest, Fortinet credentials, and Splunk PowerShell Release Threat Researchers Sean Nikkel, Ivan Righi, Austin Merritt and CISO Rick Holland ShadowTalk hosts Sean, Rick, Ivan, and Austin bring you the latest in threat intelligence. This week they cover: Mozi botnet operators arrested in Ch... 2 years ago | 18 mins Load more