Hi [[ session.user.profile.firstName ]]

How to find network threats using NIDS

Protecting corporate networks is a challenging task. In this webinar, I will elaborate on Network Intrusion Detection Systems (NIDS) – one of vital components of security solutions that analyzes network traffic and is used in perimeter protection.

This webinar will cover the following topics:

•What is NIDS, how does it work and what are the popular open-source solutions?
•Which threats can be effectively detected using NIDS?
•Real-life examples of malicious traffic and rules to catch them
•Limitations of NIDS and possible workarounds
Recorded Apr 7 2020 27 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tatyana Shishkova, security researcher at Kaspersky
Presentation preview: How to find network threats using NIDS

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • No two attacks are identical: analyzing this year’s incident response Sep 9 2020 1:00 pm UTC 60 mins
    Kaspersky and representatives from other organizations
    Daily interaction with organizations that seek assistance with full-scale incident response helps Kaspersky’s Incident Response Team understand the latest cyberthreat trends. After analyzing data containment, digital forensics investigations and malware analysis, as well as helping to improve security processes following incidents, the team now has a great knowledgebase with statistical data of recent incidents.

    After this panel discussion with experts from different organizations, attendees will understand the latest trends in attack scenarios and the details of some of the most noteworthy cases they faced. This session will be of special interest to representatives of financial organizations, government agencies, and industrial bodies, as well as others.
  • GReAT Ideas. Powered by SAS: threat hunting and new techniques Aug 25 2020 2:00 pm UTC 164 mins
    GReAT Team
    On July 22 Kaspersky's Global Research and Analysis Team (GReAT) held its second talk of ‘GReAT Ideas. Powered by SAS’ series.

    Watch the recording of the session if you missed it live.

    ‘GReAT Ideas’ will empower you with information about the threat landscape directly from the experts themselves. During the second edition of the series GReAT researchers focused on curious malware specimens and campaigns as well as the new cutting-edge tools and techniques that they have implemented in threat hunting and detection.

    The agenda includes:
    14:00Clearing the WellMess: a technical look at recent attacks by Brian Bartholomew
    14:25Threat hunting in new kicks: using VirusTotal code similarity with KTAE by Ariel Jungheit
    14:50Cloud Snooper – detecting a Linux rootkit at scale by Pierre Delcher
    15:15GReAT thoughts: Awesome IDA Pro Plugins by Boris Larin
    15:40Unmasking COVID-19 cyber-badness: content filtering at a worldwide level by Dmitry Bestuzhev and Fabio Assolini
    16:00AMA session
    16:30End of program

    Learn more on Securelist.com
  • Twitter Hack: Lessons Learned Aug 17 2020 2:00 pm UTC 30 mins
    Dmitry Galov, Security Researcher at Kaspersky
    On July 16, the social media platform Twitter experienced one—if not the biggest—security breaches in its history when cybercriminals hacked into major public figures’ verified accounts and convinced users worldwide to transfer them nearly $120,000 in bitcoin.

    While the exact details of how this breach happened may never be fully known, Twitter is not the first—nor will it be the last—to be faced with a hack. The more important question to ask here is how can these sorts of incidents be prevented in the future?

    Join Kaspersky security researcher Dmitry Galov for a look at what lessons can be taken from the Twitter hack and what policies should factor into your company’s security program. Get ready to learn:
    •The components of a strong cybersecurity program
    •How to promote cybersecurity best practices among your employees
    •Strategies for secure remote work
    •Ways to prevent spear phishing attacks from being successful

    A hack isn’t inevitable. Time to bolster your company’s security.
  • New threats in a changing world: APT trends in Q2, 2020 Recorded: Jul 29 2020 61 mins
    Costin Raiu, Vicente Diaz and David Emm - security researchers in Kaspersky’s Global Research and Analysis Team
    Kaspersky experts present their latest quarterly review of advanced persistent threat (APT) activity in 2020 in a new discussion format.

    Costin Raiu, Vicente Diaz and David Emm will review and discuss the latest campaigns, tools and techniques deployed by established and emerging threat actors, and highlight some of the most significant events and shifts that have taken place across the cyberthreat landscape in the second quarter of the year.

    During this webinar you will learn about:

    • Which APT campaigns made their mark in Q2
    • The new tools and techniques have been spotted
    • The new developments and trends the security industry should expect
    • The best way to protect users against emerging threats

    Join the GReAT team on this webinar to find out about the most up-to-date news and participate in a Q&A session with leading cybersecurity experts.
  • What’s new with corporate spam and phishing in H1 2020? Recorded: Jul 27 2020 35 mins
    Konstantin Ignatiev and Andrey Sidenko, security researchers at Kaspersky
    Kaspersky experts present their review of spam and phishing activity in the first half of 2020.

    Phishing emails remain one of the most common ways to infect user devices and 2020 has shown that this is still the case. But is there more to these content-related threats? What should employers be aware of?

    Learn about what has happened over the first half of the year in the area of corporate spam and phishing, the new topics and techniques cybercriminals came up with and what new trends we should expect in the coming second half of the year.

    During this webinar you will learn about:

    ∙ New ways phishers and spammers target organizations
    ∙ New topics and techniques used by cybercriminals in this area
    ∙ What risks phishing and spam may have on the targeted organization
    ∙ How to protect yourself and your employees from phishing and spam attacks
  • Online payment details theft via web analytics service: how to stay safe Recorded: Jul 7 2020 13 mins
    Victoria Vlasova, malware analyst at Kaspersky
    In June 2020, Kaspersky researchers uncovered a new technique for stealing users’ payment information on online shopping websites — a type of attack known as web skimming. Web skimming is a popular practice used by attackers to steal users’ credit card details from the payment pages of online stores, whereby attackers inject pieces of code into the source code of the website. This malicious code then collects the data inputted by visitors to the site (i.e. payment account logins or credit card numbers) and sends the harvested data to the address specified by attackers in the malicious code.

    This time, cybercriminals invented a new technique, abusing the capabilities of Google Analytics. By registering for web analytics accounts and injecting these accounts’ tracking code into the websites’ source code, attackers can collect users’ credit card details. About two dozen online stores worldwide were compromised using this method.

    In this webinar you will find out:

    •How cybercriminals manage to gather personal details via the web analytics service
    •Technical analysis of the new malware and its features
    •Best practices to avoid such threats

    Read the full report about the new threat on Securelist: https://securelist.com/web-skimming-with-google-analytics/97414/

    Disclaimer: Kaspersky has informed Google of the problem, and they confirmed they have ongoing investments into resolving the issue.
  • Adaptive learning on cybersecurity: How to find a tailored approach for everyone Recorded: Jun 25 2020 60 mins
    Nick J Howe, Chief Learning Officer, Area9 Lyceum; Denis Barinov, Head of Kaspersky Academy
    Employees are a company's best asset and often considered to be the heart and soul of a business. In many respects, it depends on how they are managed that determines if staff will become the weak link or an entry point for cybercriminals to take advantage of, or if they are able to contribute to its prosperity and cyber-safety.

    During this webinar you will learn:

    - Why employees’ IT mistakes can ruin your business
    - Why standard training and tip sheets do not work (and what you can do about this right now)
    - How to teach employees about topics they may not necessarily be interested in. How than to turn this knowledge into permanent behavioral change, so your employees have positive cybersecurity habits
    - Tutor in-a-box: an adaptive learning approach to fit every individual’s nature and needs
  • Threat landscape in META: cyberthreats in the new reality Recorded: Jun 23 2020 64 mins
    Amin Hasbini and Maher Yamout, Kaspersky’s GReAT
    The META threat landscape: cyberthreats in the new reality
    The world is changing every day and the cyberthreat landscape now fully reflects that. In this webinar, Amin Hasbini and Maher Yamout, security researchers from Kaspersky’s GReAT, will provide an overview of the latest cyberattacks in the META region and share their insights about the new threats to have affected the cybersecurity sector in the past month.

    You will learn more about:
    ∙ Cybersecurity after several months of working remotely: what has changed and what still needs attention
    ∙ Coronavirus and the threat landscape in the META region
    ∙ Kaspersky’s latest private threat intelligence findings on the most recent incidents in the region
  • GReAT Ideas. Powered by SAS: malware attribution and next-gen IoT honeypots Recorded: Jun 17 2020 128 mins
    GReAT researchers: Costin Raiu, Kurt Baumgartner, Denis Legezo and Kaspersky's Honeypot Team
    Get the inside scoop on GReAT, Kaspersky’s Global Research and Analysis team, which works on uncovering APTs, cyber-espionage campaigns, major malware, ransomware and underground cyber-criminal trends across the world.

    ‘GReAT Ideas. Powered by SAS’ is a series of talks held by GReAT and aimed at sharing their latest expertise on hot tech topics. Inspired by the regular team internal meet-ups, as well as by the Security Analyst Summit’s friendly atmosphere of exchanging knowledge, this series will empower you with information about the threat landscape, the most recent cases and techniques used in the cybersecurity world, directly from the experts themselves.

    Here is what you will learn during this webinar:

    Linking attacks to threat actors: case studies

    In this talk, Kurt Baumgartner will examine recent APT alerts and discussions, and how to get the jump on how or why this malware is connected with past activity. In particular, we will start with 2020 Kwampirs and Lazarus reporting and present details on these malware techniques.

    Threat hunting with Kaspersky’s new malware attribution engine

    Kaspersky introduces a new malware attribution engine, which has evolved from an internal tool used by Kaspersky’s GReAT. This technology was already leveraged in the investigation of a number of renowned APT campaigns, such as TajMahal, ShadowHammer, ShadowPad and Dtrack. See how it works in a demo by Costin G. Raiu, the director of GReAT

    Microcin-2020: GitLab programmers ban, async sockets and the sock

    In this current campaign, the threat actor Microcin is still using steganography, keeping his interest in diplomatic entities, but has improved the last-stager in an interesting way. Learn about it directly from Denis Legezo, the researcher who analyzed it.

    The next generation IoT honeypots

    Kaspersky Honeypots Team will show you the techniques and new kicks in the next generation of honeypot infrastructure being developed by Kaspersky
  • Best practices: how to find network threats effectively using NIDS Recorded: Jun 10 2020 30 mins
    Tatyana Shishkova, security analyst at Kaspersky
    Protecting corporate networks is challenging. Large organizations are attacked daily and more often than not, the speed at which you find threats entering the network is vital. Network Intrusion Detection Systems (NIDS) are key components that help protect the network perimeter and analyze network traffic. But how can they be used most effectively?

    In this webinar Tatyana Shishkova, a security researcher at Kaspersky, who specializes in threat detection, will share her expertise and cover the following topics:

    ∙ What NIDS is, how it works and where to start
    ∙ What is possible with threat detection
    ∙ Best practices and Suricata rules
    ∙ NIDS limitations and possible workarounds
  • History of Hackers: How Hackers Changed Everything Recorded: Jun 7 2020 5 mins
    David Jacoby, Security Evangelist at Kaspersky
    Technological progress, new devices and tools have evolved in the past 40 years, but how did the methods and targets actually change? What is new?

    Watch a quick overview of how hacking has changed over the past decade, presented by David Jacoby, a security evangelist from Kaspersky’s GReAT, at #SASatHome, the online version of the renowned Security Analyst Summit, which took place on 28-30, April.
  • Combining code similarity with YARA to find goodies Recorded: Jun 3 2020 62 mins
    Costin Raiu, Director Global Research & Analysis Team (GReAT)
    #SASatHome, the online version of a renowned Security Analyst Summit took place on 28-30, April. Watch one of the highlights of the event – the talk by Costin Raiu, the director of Kaspersky’s Global Research and Analysis Team (GReAT) dedicated to combining code similarity with YARA.

    There is little doubt that YARA has changed the threat hunting game. According to Costin, this is for a couple of reasons, between them: it is easy to learn, easy to use and easy to deploy. Indeed, pretty much anyone can learn and start writing YARA rules! Thanks to platforms such as VTMIS, threat hunting with YARA can help uncover threats against your organization and greatly improve your defenses and awareness. Yet, while many can do strings, code-based YARA rules are somehow rare.

    In this talk, we combine code similarity with YARA to live hunt for some fresh stuff. And while at it, we’ll be learning who is NN and why does he keep losing at Chess?
  • Preventing cybercrime with SOC augmentation Recorded: May 28 2020 37 mins
    Ewan Hubac, Product Manager, EclecticIQ; Artem Karasev, Senior Product Marketing Manager, Kaspersky
    The connected world is under constant threat of cybercrime. As enterprises further their digital transformation, they need to constantly adapt to the rapidly evolving cyberthreat landscape, while weighing up cyber-risks against overall business goals and priorities. Staying ahead of cyberthreats is a race against time. Having the right people, technology and processes is no longer enough. Cybersecurity practices, like SOC and incident response, need to be augmented with timely, relevant, and actionable cyberthreat intelligence.

    From informing strategic decisions to boosting incident containment and response, cyberthreat intelligence supports security leaders and practitioners in their mission to protect their businesses and support growth. Some key elements to that mission are:

    - Informing executive management of the current threat landscape and demonstrating return on investment

    - Shifting the enterprise security posture from reactive to proactive, and preventing breaches even before they occur, through seamless integration of technology, processes and data

    - Having all relevant information in a single pane of glass to facilitate threat hunting and response, and contribute to incident management and prioritization activity

    The Kaspersky and EclecticIQ collaboration on their portfolio of integrations guarantees high-end Cyber Threat Intelligence analysis, empowering organizations to stay ahead of cybercrime. Join us on a live webinar to learn more about the strength of our combined portfolio and offering, with a live product demonstration.
  • Upping the APT hunting game: learn the best YARA practices from Kaspersky Recorded: May 21 2020 76 mins
    Costin Raiu, security researcher in Kaspersky’s Global Research and Analysis Team
    Have you ever wondered how Kaspersky discovered some of the world’s most famous APT attacks? Now, the answer is within your reach. Watch the latest recorded webinar by Costin Raiu, director of Kaspersky’s Global Research and Analysis Team (GReAT), who will be sharing best practices on the use of YARA, an essential tool for APT hunters that can assist with the discovery of new malware samples, exploits and zero-days, speed up incident response, and increase your defenses by deploying custom rules inside your organization.

    If you ever wanted to master YARA and achieve a new level of knowledge in APT detection, mitigation and response, now is your chance.

    This brief webinar is based on Kaspersky’s exclusive training on YARA rules, which has already helped improve the APT detection strategies of many cybersecurity teams from leading businesses across the world. During the webinar, you will learn how to write test and improve effective YARA rules. You will also get a glimpse of some of our internal tools and learn how to maximize your knowledge for building effective APT detection strategies with YARA.

    This practical webinar is useful for security researchers and incident response personnel, malware analysts, security engineers, network security analysts, APT researchers and IT security staff. The content is suitable for both beginners and seasoned YARA users.

    During this webinar, you will learn about:

    •YARA syntax
    •Tips & tricks for creating fast and effective rules
    •Using YARA-generators
    •Testing YARA rules for false positives
    •Hunting new undetected samples
    •Using external modules within YARA for effective hunting
    •Anomaly search
    •Real-life examples

    Don’t miss this opportunity to learn about APT threat detection from Kaspersky’s Global Research and Analysis Team.

    Attendees’ requirements:
    Technical level: medium
    Prerequisites: knowledge of basic programming languages
    Software to install: YARA 3.11.0 or newer (if any)
  • The ransomware ecosystem: how it functions and how to protect against it Recorded: May 12 2020 40 mins
    Ivan Kwiatkowski, Senior Security Researcher, GReAT EU
    Recently INTERPOL issued a warning about the increase of ransomware threat in the time of the pandemic. According to them, there is a significant increase in the number of attempted ransomware attacks against key organizations and infrastructure engaged in the virus response.

    In fact, ransomware has been recognized as one of the most significant threats for businesses for a few years now, but not many actually know how profoundly it has developed over the past few years. As massive b2c ransomware campaigns ceased to be attractive, cyber criminals turned to those, who actually pay up – organizations.

    In this webinar, Ivan Kwiatkowski, senior security researcher at Kaspersky’s Global Research and Analysis Team (GReAT) will explain how:

    •the ransomware and cybercrime ecosystem is now structured
    •the infection process in organizations takes place
    •to secure your data and avoid falling victim to ransomware
  • APT Trends in Q1, 2020 – the latest campaigns, tools and targets Recorded: Apr 30 2020 59 mins
    Costin Raiu, Vicente Diaz and David Emm, security researchers in Kaspersky’s Global Research and Analysis Team
    Kaspersky experts present their latest quarterly review of advanced persistent threat activity in 2020. They will review the most recent campaigns, tools and techniques deployed by established and emerging threat actors, and highlight some of the most significant events taking place in the cyberthreats landscape in the first quarter of the year.

    During this webinar you will learn:
    • Which APT campaigns made their mark in Q1
    • What new tools and techniques have been used
    • How to protect against emerging threats
  • Trusted Environment. Blockchain for business: best practices, experience, tips Recorded: Apr 28 2020 59 mins
    Anjelika Rizaeva Product Marketing Manager, Kaspersky; Matvey Voytov, Chief Marketing Officer, Waves Enterprise
    Join this webinar hosted by Kaspersky and Waves Enterprise: “Trusted Environment. Blockchain for business: best practices, experience and tips”. It will prove valuable and thought-provoking to everyone who wants to learn more about how to ensure the security of blockchain-based projects.

    At this webinar, Anjelika Rizaeva and Matvey Voytov will not only have a look at what the Kaspersky approach is to protecting the blockchain, but also will dive into a number of relevant practical cases.

    You will learn about:

    - Modern enterprise blockchain platforms. We’ll tell you what they are, which tasks they solve, and what use cases are in demand.

    - Security of corporate blockchain platforms. Let's analyze the main surfaces and attack vectors.

    - Application Security Assessment based on the Waves Enterprise case study. You will see how the assessment works, what vulnerabilities were identified and how Waves Enterprise fixed them.

    - How to design a secure solution based on a blockchain platform.

    After the webinar, the speakers will answer all your questions.
  • Zero-days in the wild: 2019 retrospective Recorded: Apr 21 2020 47 mins
    Boris Larin, senior security researcher at Kaspersky
    Attacks that involve zero-day vulnerabilities remain among the most dangerous with more and more investment into zero-day exploits taking place in the criminal world. Zero-day vulnerabilities involve the exploitation of an undiscovered and unfixed weaknesses, which makes them particularly difficult to detect and prevent. If such a vulnerability is found by criminals first, it can be used to create an exploit – a special malicious program that will have open access to an entire system. This “hidden threat” attack scenario is widely used by sophisticated actors in APT attacks and was used to conduct a number of incidents in 2019.
    Security researcher Boris Larin will present an overview of four zero-day vulnerabilities detected and disclosed by Kaspersky in 2019, following mechanisms that detected the exploit, which included Miscosoft Windows OS and Google Chrome exploits.
    In this session, Boris will share:
    •What is happening in the zero-day market
    •What framework was often used to implement many zero-day exploits
    •What work was done by him and his team when working on the following vulnerabilities:
    CVE-2019-0797, CVE-2019-0859, CVE-2019-1458, CVE-2019-13720
  • Adapting to a new reality: threat landscape and cybersecurity challenges in 2020 Recorded: Apr 15 2020 63 mins
    Amin Hasbini and Maher Yamout, security researchers at Kaspersky, GReAT
    In this webinar, Amin Hasbini and Maher Yamout, security researchers at Kaspersky’s GReAT in the META region, will share their insights on how the coronavirus epidemic has affected cybersecurity.

    You will find out:

    • The cyber security challenges of working remotely in the current circumstances
    • Recent threat landscape as seen by Kaspersky and cyber threats related to the Coronavirus epidemic
    • Sneak peeks into the latest private threat intelligence findings by Kaspersky related to META
  • Financial threat landscape: what we’ve seen and how to stay safe Recorded: Apr 14 2020 56 mins
    Dmitry Bestuzhev, Head of Global Research & Analysis Team, Latin America
    Cybercriminals are, more often than not, after money, and that’s why finances have long been a primary target of cybercriminals. However, you can protect yourself and your institution. The first step? Being aware of the ever-evolving ways in which these malicious actors attack.

    Join this webinar with the Head of Kaspersky's Latin America Global Research and Analysis Team (GReAT), Dmitry Bestuzhev, to learn:

    •The techniques and tactics cybercriminals have been using to attack financial institutions in 2019
    •Evolution of mobile malware and banking Trojans
    •How to protect yourself and your organization from becoming compromised
    •New threats in the times of a pandemic

    Keep your finances secure in 2020.
Latest on cyberthreats and protection technologies
Top-notch cybersecurity and protection technology experts share their knowledge on how to mitigate the most dangerous cyberthreats that any organization may face. Contact us at https://www.kaspersky.com/about/contact

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to find network threats using NIDS
  • Live at: Apr 7 2020 5:00 pm
  • Presented by: Tatyana Shishkova, security researcher at Kaspersky
  • From:
Your email has been sent.
or close