Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date New (and free) analysis tools for the cyber threat hunter Chris Doman, Tawnya Lancaster, Amy Pace, Michael Vaughn - AT&T Cybersecurity Today’s threat detection systems are highly effective for most attacks however no single system can detect 100 percent of attacks all the time. In res... 7 months ago | 60 mins 마이크로소프트 익스체인지 제로데이 취약점 - MS Exchange Proxy Logon Tony Kim 2021년 3월 마이크로소프트는 Exchange Server의 제로 데이 취약점을 노린 HAFNIUM 캠페인이 진행 중이라 밝혔습니다. 마이크로소프트의 발표에 따르면 이번 위협은 취약점을 이용해 초기 시스템 접근 권환을 획득한 후 웹 쉘을 배포하고, 이를 발판 삼아 자... 1 year ago | 10 mins How to Defend Against Supply Chain Ransomware Attacks like Kaseya Deepen Desai ,Chief Information Security Officer, Zscaler and Amit Banker Director, Security Research, Zscaler The recent Kaseya supply chain ransomware attack serves as the latest reminder that even the most widely trusted tools and partners in an IT environme... 10 months ago | 31 mins 对微软 ProxyLogon Exchange 漏洞的见解和相关攻击活动 郑聿铭 - FireEye 大中華區技术顾问 最近,公众了解到影响微软Exchange服务器的多个漏洞。从那时起,许多人开始意识到这些攻击可能会影响数以万计的组织--其中许多人可能不知道从哪里开始。无论您的组织规模、行业或地区如何,您都可以采取一些步骤来识别环境中被利用的 Exchange漏洞。 在这线上研讨会中,我们将讨论以下问题。 - 这次... 1 year ago | 43 mins Get Compete Threat Visibility with All-in-One Security Essentials Senthil Palaniappan, Founder and CEO, Sennovate Inc. Any organization’s security depends on its ability to rapidly detect and respond to emerging threats across your cloud and on-premises environments. Y... 2 years ago | 34 mins Open Banking Trends, Challenges, and Opportunities Roy Muermann, Solutions Architect, F5 | Dan Henley, RVP, Global Solutions Engineering, NGNIX (Part of F5) Open banking can change the game for financial services and empower account holders like never before. Customers are demanding transparency and access... 10 months ago | 46 mins Insights into the ProxyLogon Exchange Vulnerabilities & related attack activity Steve Ledzian, Yihao Lim, Vinoo Thomas & Ryan Delany Speakers: • Steve Ledzian, CTO & VP, APAC - FireEye • Yihao Lim, Principal Intelligence Enablement Consultant, APAC - Mandiant • Vinoo Thomas, Senior ... 1 year ago | 64 mins FireEye Chat - Front and Center with Kevin Mandia and the Evolution of M-Trends Vasu Jakkal, EVP & CMO, FireEye; Kevin Mandia, CEO, FireEye FireEye Chat Front and Center with Today’s Leading Cyber Security Experts FireEye Chat is a new quarterly talk show that brings guest experts front a... 3 years ago | 20 mins Optimize Phishing Detection and Response with LogRhythm and Office 365 Randy Franklin Smith (UWS) | Greg Foss (LogRhythm) Today’s hackers often favor the phishing email as their weapon of choice. Phishing attacks are not only common, but are also very difficult to defend ... 4 years ago | 78 mins Keeping Ransomware out of Critical Infrastructure: Colonial Pipeline Attack Virsec Between the SolarWinds attack, MS Exchange server hack, and recent ransomware attack on Colonial Pipeline, countless organizations across nearly every... 1 year ago | 33 mins Load more