Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Ransomware Defence with Ongoing Emulation - the new phase of security validation Jerry Khan, Consulting Systems Engineer Ransomware is constantly evolving and attackers are always changing their strategies. It is important to understand the adversaries and what we are fi... 4 months ago | 49 mins Know thy Self and thine Enemies Soong Chee, Architect Systems Solutions If you know the enemy and know yourself; - How can you monitor the dark web for your brand? - Do you have exposed credentials? - Are your VIPs being ... 7 months ago | 60 mins Leveraging adversarial data for security control validation and compliance Franco Ardiani, Software Engineer, Attack IQ and Vicente Diaz, ThreatIntel Strategist, VirusTotal Nowadays, using real attacker’s TTPs (Tactics, Techniques, and Procedures) and artifacts they use is a must in any security strategy. Selecting the ri... 2 years ago | 40 mins How to Defend against BlackCat Group and Ransomware-as-a-Service Operations Arnab Roy & Filippo Sitzia According to our October 2021 Advanced Threat Research report, Ransomware campaigns maintained their prevalence with high profile attacks and expanded... 12 months ago | 49 mins