Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Cyber Notes Cast - The Biggest Vectors of Cyberattacks in SMEs senhasegura Small and medium-sized enterprises usually do not make or have the capacity to make large investments in digital security, which makes them vulnerable... June 7, 2023 3:00pm Unabashed. Unashamed. Unpredictable. The Changing Face of Ransomware. Sam Rubin, VP, Chris Scott, Managing Partner, David Faraone, Consulting Senior Director & LeeAnne Pelzer, Consulting Director How to Stay Ahead of the Latest Ransomware TTPs Multi-extortion tactics are on the rise. Threat actors are increasingly using data theft and harassme... 6 days ago | 26 mins Lab: Subdomain Takeover, Part 1 | Identify attack paths Carlos Vendramini, Security Research Engineer, Normalyze In the first part of this two-part series, Carlos will go over the current landscape for subdomain takeover by analyzing some bug bounty report statis... 3 weeks ago | 19 mins DDoS Threat Intelligence Report: Adaptive DDoS and new Threat Insights Karl Heuser, Business Manager Security - DACH & EEUR, NETSCOUT Today's DDoS attacks are not only sophisticated and combine multiple attack vectors, but they are also adaptively executed by attackers. Cybercriminal... June 29, 2023 8:00am Cisco Talos Incident Response (CTIR)-on Air: Recapping 2022 (Part 1 of 3) Bruce Hennigar,Threat Researcher,Nate Pors,Incident Commander,Liz Waddel,Engineering Lead,Brett Ellis,Talos Incident Response Cisco Talos incident responders recap the top threats of Q2 2022, discussing the latest attacker trends and the most prevalent malware families they'v... 3 months ago | 46 mins Attacker Automation: How Bots Are Evading Your Defenses For Fraud And Profit David Warburton, Director, Threat Research, F5 labs As defenders, we increasingly look to automation and machine learning to detect attacks and tune our defences. But we’re not alone. Organised crime co... 3 months ago | 58 mins Still the One: Protecting Email, the Once and Future #1 Threat Vector Ravisha Chugh, Principal Analyst, Gartner and Ryan Kalember, EVP of Cybersecurity Strategy, Proofpoint Featuring: Gartner Today’s threat landscape is evolving quickly. It is characterized by advanced and costly attacks like BEC, ransomware and data los... 11 months ago | 39 mins 2021 Cyber Threat Landscape Tim Choi, VP Product Marketing, Sherrod DeGrippo, Sr. Director, Threat Research and Detection, Proofpoint Every year, Proofpoint’s threat research team examines trends from the prior year and looks ahead for changes in the threat landscape for the year to ... 2 years ago | 58 mins LIVE TALKS: Unpacking Business Email Compromise & Email Account Compromise Cheryl Tang, Product Marketing Director & Tony Paterra, VP of Product Management, at Proofpoint More money is lost to Business Email Compromise (BEC) and Email Account Compromise (EAC) attacks than to any other cybercriminal activity. According t... 3 years ago | 33 mins In the Bullseye: Healthcare and Email Threat Vectors Ryan Witt, Proofpoint; John Carnes, Information Security Professional; Shelly Epps, Duke Health; Brandon Dunlap, Moderator Threat actors are targeting individuals in the Healthcare industry and using email as their main entry point for cyber attacks. These attacks are aime... 2 years ago | 62 mins Load more