Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Q3 Malware Review: Evolution of Locky and Quiet Malware Brendan Griffin, Threat Intelligence Manager, PhishMe During the third quarter of 2016, the PhishMe Intelligence team generated 689 active threat reports that highlighted indicators of compromise, tactics... 6 years ago | 33 mins Ransomware Resurgence: Locky and Other “New Cryptolockers” Nick Bilogorskiy, Sr. Director, Threat Operations, Cyphort Like many viruses, botnets and malware families that we’ve seen over the past decade, hackers continue to find new ways of reinventing old threats. An... 6 years ago | 39 mins Locky, WannaCry, Spectre&Meltdown und LockerGoga – Was kommt als nächstes? Quest EMEA Cyberattacken gehören leider zum normalen „Bedrohungs-Alltag“. Neben erheblichen Image-Schäden gehen Cyberattacken fast immer mit gravierenden finanzi... 2 years ago | 42 mins Locky, WannaCry, Spectre & Meltdown and LockerGoga – What's next? Be prepared! Quest Cyber attacks are unfortunately a part of our normal "everyday IT life". In addition to considerable image damage, cyber attacks are almost always acc... 2 years ago | 42 mins How to secure your data with Continuous Data Protection from DataCore Software? Ilpo Wilkman Do you know how to protect your file shares, databases etc. with the functions of the storage? Join our presentation and you will understand how Conti... 6 years ago | 28 mins Confronting the Ransomware Crisis: Best Practices for Securing Your Business Dan Maier, VP Marketing Ransomware such as CryptoLocker, CryptoWall and Locky are targeting businesses with massive hybrid cyber-attacks that leverage both email and the web ... 4 years ago | 44 mins Addressing Vulnerabilities and Threats from Dark Web Attacks Jack Danahy, SVP, Security of Alert Logic and Jeffrey Pearl, CEO of OTG Consulting Ever wonder how cheap it is to purchase malware or ransomware on the dark web? A recent study by a security firm, published the following dark web pri... 3 years ago | 34 mins “Cloud-First” Ransomware: A Technical Analysis Netskope chief scientist Krishna Narayanaswamy and Director of Netskope Threat Research Labs Ravi Balupari Get a technical analyses of recent malware campaigns discovered or documented by Netskope Threat Research Labs and learn how to defend against them. ... 5 years ago | 44 mins "Cloud-First" Ransomware - A Technical Analysis Bob Gilbert and Sean Hittel of Netskope Cloud services have emerged as the preferred attack vector of some of the most dangerous and innovative cloud malware exploits of the past six months.... 5 years ago | 43 mins Overview of the Ransomware scene in 2016 AnubisNetworks, Senior Threat Intel Researcher Ransomware is on the rise. Only in the first quarter of 2016 a dozen of new families have emerged with Locky leading the way. This webinar will summar... 6 years ago | 38 mins