Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Akamai SOTI - DNS Traffic Insights Threat Report: Part 2 Richard Meeus, Director of Security Technology and Strategy, EMEA and Eliad Kimhy, Head of Akamai Security Research, Akamai In our first State of the Internet / Security report of 2023 we will share insights into the latest attack trends based on DNS traffic on corporate an... 3 days ago | 27 mins Akamai SOTI - DNS Traffic Insights Threat Report: Part 1 Richard Meeus, Director of Security Technology and Strategy, EMEA & Eliad Kimhy Head of Akamai Security Research CORE team In our first State of the Internet / Security report of 2023 we will share insights into the latest attack trends based on DNS traffic on corporate an... 1 week ago | 26 mins Dark Web and Cyber Intelligence Collection [APAC] Jeremy Makowski, Senior Threat Intelligence Researcher & Julien Soukhavong Threat Intelligence Specialist EMEA West at Rapid7 Cybercriminals lurk in the dark web to methodically coordinate their attacks, sell illicit goods, distribute malware and phishing kits, and share othe... 4 weeks ago | 38 mins Dark Web and Cyber Intelligence Collection [EMEA] Jeremy Makowski, Senior Threat Intelligence Researcher & Julien Soukhavong Threat Intelligence Specialist EMEA West at Rapid7 Cybercriminals lurk in the dark web to methodically coordinate their attacks, sell illicit goods, distribute malware and phishing kits, and share othe... 1 month ago | 38 mins External Cyber Defense for When Your Attack Surface is Everywhere Lorri Janssen-Anessi, Kevin Diffily, and George Aquila | BlueVoyant The evolving cyber threat landscape has security teams scrambling to respond to an onslaught of attacks from all angles. Between sophisticated phishin... 3 weeks ago | 55 mins The Modern Approach to Fight Phishing Justin Pemberton - Senior Director of Sales for UK & Ireland, IRONSCALES Phishing continues to be the preferred method that cybercriminals use to gain access to a business-critical information. While many organisations have... 5 months ago | 43 mins Analysis of phishing kits Specialists at Cyren A phishing kit includes the web pages and software code used to display mirror images of legitimate services and collect exposed credentials, payment ... 1 year ago | 55 mins Analysis of phishing kits Specialists at Cyren A phishing kit includes the web pages and software code used to display mirror images of legitimate services and collect exposed credentials, payment ... 1 year ago | 58 mins External Cyber Defense for when Your Attack Surface is Everywhere Lorri Janssen-Anessi, Dir, External Cybersecurity Assessments, BlueVoyant;Kevin Diffily, Product Mkt Mgr, BlueVoyant;B Dunlap The CISO’s job now includes much more than just securing an organization’s internal network. The evolving cyber threat landscape has security teams sc... 5 months ago | 58 mins State of the Internet / Security: Phishing for Finance Siddharth Deshpande, Director, Security Strategy, APJ It was another record-breaking year for cyberattacks against the financial industry. Credential stuffing attacks were up 45%, while SQL Injection and ... 2 years ago | 36 mins Load more