Fight Back Against Double Extortion Cyberattacks: Mitigate Lilith Ransomware

Logo
Presented by

Marco Mozzi & Kevin Breuer, LogRhythm Enterprise Sales Engineers

About this talk

Ransomware is one of the most damaging and frequent forms of cyberattack facing modern organizations and is a security challenge that is constantly evolving. During the first half of 2022, there were a total of 236.1 million ransomware attacks worldwide, according to Statista*. As these attack methods continue to be a lucrative source of income for threat actors, preparing for ransomware attacks needs to be a top priority for organizations. In this webinar, our team will discuss how to detect and mitigate ransomware attacks, with a focus on a new tool for attack, Lilith Ransomware. Lilith is a C/C++ console-based ransomware which is designed to lock Windows machines via a double extortion attack. Join us to discover: • Why ransomware attacks are more prevalent and destructive than ever before • Practical tips to help you detect and respond to ransomware attacks • How a SIEM can be used to gain real-time threat detection capabilities • The benefit of utilizing customized rules to rapidly respond to Lilith ransomware attempts * - https://www.statista.com/statistics/494947/ransomware-attacks-per-year-worldwide/
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (257)
Subscribers (76931)
LogRhythm helps security teams stop breaches by turning disconnected data and signals into trustworthy insights. From connecting the dots across diverse log and threat intelligence sources to using sophisticated machine learning that spots suspicious anomalies in network traffic and user behavior, LogRhythm accurately pinpoints cyberthreats and empowers professionals to respond with speed and efficiency. With cloud-native and self-hosted deployment flexibility, out-of-the-box integrations, and advisory services, LogRhythm makes it easy to realize value quickly and adapt to an ever-evolving threat landscape. Together, LogRhythm and our customers confidently monitor, detect, investigate, and respond to cyberattacks. Learn more at logrhythm.com