Hi [[ session.user.profile.firstName ]]

DD4BC and the Rise of Extortion

DD4BC has targeted many businesses, threatening an attack and demanding Bitcoin payments. Learn about their tactics and techniques, and why Akamai believes that other copycat groups are on the horizon.
Recorded Feb 1 2016 34 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike Kun, Manager, Akamai Customer Security Incident Response Team
Presentation preview: DD4BC and the Rise of Extortion

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Simple, Secure Third-Party Application Access Recorded: Mar 16 2017 32 mins
    Jim Black, Senior Product Marketing Manager, Enterprise, Akamai, Tom Adamski, Enterprise Solutions Engineer, EMEA, Akamai
    Providing employees with secure access to enterprise applications deployed behind the firewall is a core requirement for all businesses. Increasingly, enterprises must also deal with the riskier proposition of providing this same access to third parties, including their contractors, partners, suppliers, and customers. Enabling secure application access, whether hosted in a public cloud or private data center, is a complex and cumbersome task.

    Join this webinar to hear about:

    - Survey results revealing how your peers approach third-party access management
    - How to remove complexity around the management of third-party access
    - Challenges associated with moving a traditional network perimeter to the cloud
    - How third-party access exposes the enterprise to risk
    - Akamai’s innovative new cloud-service, which provides secure access to enterprise applications that live behind the firewall
  • Availability 101: How to Defend against Cyber Attacks Recorded: Mar 14 2017 31 mins
    Jay Coley, Sr. Director Security Strategy and Planning EMEA, Akamai Technologies
    With DDoS cyber attacks rapidly increasing in both size and speed, as well as attacks that are crafted for a specific application or service, it’s never been so critical to ensure your basic availability is sound. Mitigation services can no longer be ‘one size fits all’. Organisations now need a tailored platform for the specific application or service to ensure 100% availability. Without availability ensured then other security overlays are meaningless.

    This webinar will look at attack trends and case studies and provide top tips on how to stay ‘always on’ in the face of cyber attacks.
  • State of the Internet Security Report: Q4 2016 Findings Recorded: Feb 16 2017 61 mins
    Daniel Shugrue, Director of Product Marketing, Akamai, Miguel Serrano, Director of Product Marketing, Akamai
    Akamai sees more than two trillion Internet interactions every day and has mitigated malicious attack traffic over 600 Gbps. Our security experts analyze this information to share trends, observations, and findings in the quarterly State of the Internet / Security Report .

    Join us for an overview of distributed denial of service (DDoS) and web application trends based on data gathered from Q4 2016.

    Key topics will include:

    The continued rise of IoT botnet including Mirai
    Source and target countries for web application and DDoS attacks
    Perimeter firewall DDoS reflector activity based on observed attacks
    Spotlight on Black Friday web application attacks against retailers
  • State of the Internet Security Report: Q3 2016 Findings Recorded: Nov 16 2016 60 mins
    Miguel Serrano, Director of Product Marketing, Akamai
    Akamai sees more than 2 trillion Internet interactions every day and mitigates 40 – 50 DDoS attacks every month. Our security experts analyze this information and share trends, observations, and findings in the quarterly State of the Internet Security report.

    Join this for an overview of what we found after analyzing data from Q3 of 2016.

    Key topics covered will include:

    Why DDoS of over 100 Mbps increased over the past quarter
    Which country is the new leader for most sourced Web application attacks
    Tactics Akamai used to mitigate two of the largest DDoS attacks we’ve seen
    Web application attack metrics around the Summer Olympics and the UEFA Euro Championship Game
  • Holiday Retail Readiness with Akamai Recorded: Sep 22 2016 58 mins
    Jason Miller Chief Strategist of Commerce Akamai Technologies, Ari Weil Senior Director, Industry Marketing Akamai Technologi
    Your consumers are more engaged on mobile devices than ever before. Mobile commerce is up more than 50% globally and retail revenues are 60% greater than this time last year. Online retailers must be more prepared than ever to support a daunting number of connected devices operating on a variety of browsers and networks.

    Security must go hand-in-hand with performance this holiday season - retail leads the way as the industry most frequently targeted by attackers. In Q4 2015 nearly 60% of all cyber-attacks in North America targeted retail companies, and DDoS attacks were up 129%.

    With projections suggesting that this holiday season will break last year’s records, maintaining a high-quality user experience will be more challenging and more rewarding than ever before.

    Join Akamai's eCommerce experts to learn how best to position your business for success this holiday season.
  • State of the Internet Security Report: Q2 2016 Findings Recorded: Sep 7 2016 60 mins
    Daniel Shugrue, Director of Security Product Marketing, Akamai, Miguel Serrano Director of Product Marketing Akamai
    Akamai’s threat intelligence is unique because of the depth and breadth of Internet traffic we see on a daily basis. We carry traffic from the 30 largest media organisations, 100 of the world’s largest banks, and 96 of the top 100 online US retailers. This provides visibility into the disposition of both legitimate and malicious traffic around the globe and across industries. We analyse this information and share trends, observations, and findings in the State of the Internet Security report.

    Join this webinar for an overview of the most important takeaways from our soon-to be released report.

    How and why application attacks have shifted by industry, moving away from hotel/travel and towards high tech
    Which country wins the gold medal for most sourced attacks
    An in-depth analysis of anonymisation: the use of proxies and VPN by threat actors
    A breakdown and description of the top bot types
    The nature, size, and tactics Akamai employed to mitigate the largest DDoS attack seen to date
  • Using Data Analytics to Predict Malicious Intent Recorded: Feb 17 2016 49 mins
    Alistair Tooth, Director, Akamai
    Adoption of data-driven security is set to rise threefold in 2016. Benefits include advanced security automation, accuracy and intelligence that enable mitigation capabilities to adapt in real time as threats change. However, solutions will only be as effective as the age, quality and quantity of the data available, meaning access to vast amounts of live attack traffic will be vital. Join us for this webinar to learn more about data-driven security and how it’s being deployed to bolster web defences.
  • DD4BC and the Rise of Extortion Recorded: Feb 1 2016 34 mins
    Mike Kun, Manager, Akamai Customer Security Incident Response Team
    DD4BC has targeted many businesses, threatening an attack and demanding Bitcoin payments. Learn about their tactics and techniques, and why Akamai believes that other copycat groups are on the horizon.
  • Hacker’s Toolkit: DDoS for Hire Recorded: Dec 1 2015 48 mins
    Martin McKeay, Senior Security Advocate, Akamai
    It’s no secret that there are botnets for hire, groups of computers that can, and are, used against our organizations on a daily basis. But what is the nature of these botnets? What abilities do each of the installed toolkits offer to the attacker? Most importantly how do their capabilities change the defenses necessary to protect yourself?

    We’ll cover two of the most recent toolkits that have been seeing wide usage. Learn a little about the people behind the attacks, where the attacks are coming from and what you might expect to see in the near future. You might be a bit surprised at where a lot of the traffic is coming from (hint: it’s closer than you think).
  • The Known and Unknown Costs of DDoS Recorded: Nov 4 2015 32 mins
    Martin McKeay, Senior Security Advocate, Akamai in Europe
    Criminals are increasingly turning to cyber-crime as their method of choice, thanks to the increased accessibility provided by numerous automated attack tools and ‘for hire’ subscription services. The number of Distributed Denial of Service (DDoS) attacks against organisation’s websites, for example, are increasing rapidly and the true business costs are often unknown. In addition to the more obvious impacts associated with the lost web transactions associated with downtime, there are also reputational and other ephemeral costs that are harder to quantify.

    We’ll be examining both the monetary and reputational costs of an attack on your infrastructure, as well some of the measures you can take to combat these attacks. With data drawn from Akamai’s State of the Internet Report, we’ll be talking about real world examples of attacks and how these could affect your business.
  • DDoS: Aged Protocols are Fuelling Attacks Recorded: Sep 15 2015 36 mins
    Martin McKeay, Security Advocate, Akamai Technologies
    They say old protocols never die. Okay, no one really says that, but it’s what happens in reality. If you look around a little, you can still find organisations with token ring networks while dial-up modems still account for a small, but significant part of Internet usage worldwide. And then there are the current protocols that simply never get updated. DNS and NTP are staples of the Internet that are absolutely necessary.

    Martin McKeay, Akamai’s Security Advocate for EMEA, will explore the dangers of some of the outdated and unpatched protocols on the Internet today. These antiquated communication methods are being used and abused by malicious actors to send traffic and attacks against your network. Explore how to protect yourself, and learn good network hygiene practices to make sure your organisation is not part of the problem.
  • HTTP/2 Uncovered: Top Tips for Successful Implementation Recorded: Aug 26 2015 52 mins
    Michael Gooding, Web Performance Evangelist, Akamai; Richard Still, Technical Architect, Financial Times
    This webinar gives practical advice for supporting HTTP/2 implementation and shares the experiences of the Financial Times, who have already been through the process.
  • Retail Week Holiday Shopping Trends 2014: preparing for peak trading Recorded: Apr 22 2015 56 mins
    Alex Hamilton, Retail Week, Michael Gooding, Akamai, Anthony Norman, GFK
    As consumers embrace event-based purchasing – Black Friday, Cyber Monday – the shift away from purely seasonal trading is disrupting established trading patterns and threatening to eat into sales and margins. In the UK, for instance, British shoppers spent £810 million on Black Friday promotions alone. Meanwhile, the way in which consumers shop at peak times is also evolving, with online, especially mobile, playing a greater role in the path to purchase.

    With this in mind, Retail Week and Akamai ask:

    Why was Black Friday such a hit with UK consumers last year?
    What do retailers need to do to ensure they can meet consumer demand during these peak trading periods?
    How can retailers understand their website capacities and vulnerabilities to better handle these capacity demands?
    And what do they need to do to ensure that the customer experience matches next-level consumer expectations?
  • Using Client Reputation to Intelligently Defend your Web Applications Recorded: Mar 11 2015 53 mins
    Daniel Shugrue, Director of Product Marketing, Akamai
    A Web application firewall inspects requests and filters those that are deemed malicious. In comparison, Client Reputation focuses on the source of the request, and determines the extent to which that source has sent malicious requests in the past. This intelligence allows organisations to forecast intent and protect applications against Distributed Denial of Service and application layer attacks. In this webinar, Daniel Shugrue, Director of Web Security Solutions at Akamai, will discuss the fundamentals of Client Reputation and how it can further enhance your application security posture.
Making the Internet Fast, Reliable and Secure
As the global leader in Content Delivery Network (CDN) services, Akamai makes the Internet fast, reliable and secure for its customers. The company’s advanced web performance, mobile performance, cloud security and media delivery solutions are revolutionising how businesses optimise consumer, enterprise and entertainment experiences for any device, anywhere. To learn how Akamai solutions and its team of Internet experts are helping businesses move faster forward, please visit www.akamai.com or blogs.akamai.com/uk, and follow @AkamaiUK on Twitter.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: DD4BC and the Rise of Extortion
  • Live at: Feb 1 2016 3:40 pm
  • Presented by: Mike Kun, Manager, Akamai Customer Security Incident Response Team
  • From:
Your email has been sent.
or close