Hi [[ session.user.profile.firstName ]]

The ransomware ecosystem: how it functions and how to protect against it

Recently INTERPOL issued a warning about the increase of ransomware threat in the time of the pandemic. According to them, there is a significant increase in the number of attempted ransomware attacks against key organizations and infrastructure engaged in the virus response.

In fact, ransomware has been recognized as one of the most significant threats for businesses for a few years now, but not many actually know how profoundly it has developed over the past few years. As massive b2c ransomware campaigns ceased to be attractive, cyber criminals turned to those, who actually pay up – organizations.

In this webinar, Ivan Kwiatkowski, senior security researcher at Kaspersky’s Global Research and Analysis Team (GReAT) will explain how:

•the ransomware and cybercrime ecosystem is now structured
•the infection process in organizations takes place
•to secure your data and avoid falling victim to ransomware
Recorded May 12 2020 40 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ivan Kwiatkowski, Senior Security Researcher, GReAT EU
Presentation preview: The ransomware ecosystem: how it functions and how to protect against it

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Best practices: how to find network threats effectively using NIDS Jun 10 2020 2:00 pm UTC 45 mins
    Tatyana Shishkova, security analyst at Kaspersky
    Protecting corporate networks is challenging. Large organizations are attacked daily and more often than not, the speed at which you find threats entering the network is vital. Network Intrusion Detection Systems (NIDS) are key components that help protect the network perimeter and analyze network traffic. But how can they be used most effectively?


    In this webinar Tatyana Shishkova, a security researcher at Kaspersky, who specializes in threat detection, will share her expertise and cover the following topics:

    ∙ What NIDS is, how it works and where to start
    ∙ What is possible with threat detection
    ∙ Best practices and Suricata rules
    ∙ NIDS limitations and possible workarounds
  • Preventing cybercrime with SOC augmentation May 28 2020 2:00 pm UTC 45 mins
    Ewan Hubac, Product Manager, EclecticIQ; Artem Karasev, Senior Product Marketing Manager, Kaspersky
    The connected world is under constant threat of cybercrime. As enterprises further their digital transformation, they need to constantly adapt to the rapidly evolving cyberthreat landscape, while weighing up cyber-risks against overall business goals and priorities. Staying ahead of cyberthreats is a race against time. Having the right people, technology and processes is no longer enough. Cybersecurity practices, like SOC and incident response, need to be augmented with timely, relevant, and actionable cyberthreat intelligence.

    From informing strategic decisions to boosting incident containment and response, cyberthreat intelligence supports security leaders and practitioners in their mission to protect their businesses and support growth. Some key elements to that mission are:

    - Informing executive management of the current threat landscape and demonstrating return on investment

    - Shifting the enterprise security posture from reactive to proactive, and preventing breaches even before they occur, through seamless integration of technology, processes and data

    - Having all relevant information in a single pane of glass to facilitate threat hunting and response, and contribute to incident management and prioritization activity

    The Kaspersky and EclecticIQ collaboration on their portfolio of integrations guarantees high-end Cyber Threat Intelligence analysis, empowering organizations to stay ahead of cybercrime. Join us on a live webinar to learn more about the strength of our combined portfolio and offering, with a live product demonstration.
  • Upping the APT hunting game: learn the best YARA practices from Kaspersky Recorded: May 21 2020 76 mins
    Costin Raiu, security researcher in Kaspersky’s Global Research and Analysis Team
    Have you ever wondered how Kaspersky discovered some of the world’s most famous APT attacks? Now, the answer is within your reach. Watch the latest recorded webinar by Costin Raiu, director of Kaspersky’s Global Research and Analysis Team (GReAT), who will be sharing best practices on the use of YARA, an essential tool for APT hunters that can assist with the discovery of new malware samples, exploits and zero-days, speed up incident response, and increase your defenses by deploying custom rules inside your organization.

    If you ever wanted to master YARA and achieve a new level of knowledge in APT detection, mitigation and response, now is your chance.

    This brief webinar is based on Kaspersky’s exclusive training on YARA rules, which has already helped improve the APT detection strategies of many cybersecurity teams from leading businesses across the world. During the webinar, you will learn how to write test and improve effective YARA rules. You will also get a glimpse of some of our internal tools and learn how to maximize your knowledge for building effective APT detection strategies with YARA.

    This practical webinar is useful for security researchers and incident response personnel, malware analysts, security engineers, network security analysts, APT researchers and IT security staff. The content is suitable for both beginners and seasoned YARA users.

    During this webinar, you will learn about:

    •YARA syntax
    •Tips & tricks for creating fast and effective rules
    •Using YARA-generators
    •Testing YARA rules for false positives
    •Hunting new undetected samples
    •Using external modules within YARA for effective hunting
    •Anomaly search
    •Real-life examples

    Don’t miss this opportunity to learn about APT threat detection from Kaspersky’s Global Research and Analysis Team.

    Attendees’ requirements:
    Technical level: medium
    Prerequisites: knowledge of basic programming languages
    Software to install: YARA 3.11.0 or newer (if any)
  • The ransomware ecosystem: how it functions and how to protect against it Recorded: May 12 2020 40 mins
    Ivan Kwiatkowski, Senior Security Researcher, GReAT EU
    Recently INTERPOL issued a warning about the increase of ransomware threat in the time of the pandemic. According to them, there is a significant increase in the number of attempted ransomware attacks against key organizations and infrastructure engaged in the virus response.

    In fact, ransomware has been recognized as one of the most significant threats for businesses for a few years now, but not many actually know how profoundly it has developed over the past few years. As massive b2c ransomware campaigns ceased to be attractive, cyber criminals turned to those, who actually pay up – organizations.

    In this webinar, Ivan Kwiatkowski, senior security researcher at Kaspersky’s Global Research and Analysis Team (GReAT) will explain how:

    •the ransomware and cybercrime ecosystem is now structured
    •the infection process in organizations takes place
    •to secure your data and avoid falling victim to ransomware
  • APT Trends in Q1, 2020 – the latest campaigns, tools and targets Recorded: Apr 30 2020 59 mins
    Costin Raiu, Vicente Diaz and David Emm, security researchers in Kaspersky’s Global Research and Analysis Team
    Kaspersky experts present their latest quarterly review of advanced persistent threat activity in 2020. They will review the most recent campaigns, tools and techniques deployed by established and emerging threat actors, and highlight some of the most significant events taking place in the cyberthreats landscape in the first quarter of the year.

    During this webinar you will learn:
    • Which APT campaigns made their mark in Q1
    • What new tools and techniques have been used
    • How to protect against emerging threats
  • Trusted Environment. Blockchain for business: best practices, experience, tips Recorded: Apr 28 2020 59 mins
    Anjelika Rizaeva Product Marketing Manager, Kaspersky; Matvey Voytov, Chief Marketing Officer, Waves Enterprise
    Join this webinar hosted by Kaspersky and Waves Enterprise: “Trusted Environment. Blockchain for business: best practices, experience and tips”. It will prove valuable and thought-provoking to everyone who wants to learn more about how to ensure the security of blockchain-based projects.

    At this webinar, Anjelika Rizaeva and Matvey Voytov will not only have a look at what the Kaspersky approach is to protecting the blockchain, but also will dive into a number of relevant practical cases.

    You will learn about:

    - Modern enterprise blockchain platforms. We’ll tell you what they are, which tasks they solve, and what use cases are in demand.

    - Security of corporate blockchain platforms. Let's analyze the main surfaces and attack vectors.

    - Application Security Assessment based on the Waves Enterprise case study. You will see how the assessment works, what vulnerabilities were identified and how Waves Enterprise fixed them.

    - How to design a secure solution based on a blockchain platform.

    After the webinar, the speakers will answer all your questions.
  • Zero-days in the wild: 2019 retrospective Recorded: Apr 21 2020 47 mins
    Boris Larin, senior security researcher at Kaspersky
    Attacks that involve zero-day vulnerabilities remain among the most dangerous with more and more investment into zero-day exploits taking place in the criminal world. Zero-day vulnerabilities involve the exploitation of an undiscovered and unfixed weaknesses, which makes them particularly difficult to detect and prevent. If such a vulnerability is found by criminals first, it can be used to create an exploit – a special malicious program that will have open access to an entire system. This “hidden threat” attack scenario is widely used by sophisticated actors in APT attacks and was used to conduct a number of incidents in 2019.
    Security researcher Boris Larin will present an overview of four zero-day vulnerabilities detected and disclosed by Kaspersky in 2019, following mechanisms that detected the exploit, which included Miscosoft Windows OS and Google Chrome exploits.
    In this session, Boris will share:
    •What is happening in the zero-day market
    •What framework was often used to implement many zero-day exploits
    •What work was done by him and his team when working on the following vulnerabilities:
    CVE-2019-0797, CVE-2019-0859, CVE-2019-1458, CVE-2019-13720
  • Adapting to a new reality: threat landscape and cybersecurity challenges in 2020 Recorded: Apr 15 2020 63 mins
    Amin Hasbini and Maher Yamout, security researchers at Kaspersky, GReAT
    In this webinar, Amin Hasbini and Maher Yamout, security researchers at Kaspersky’s GReAT in the META region, will share their insights on how the coronavirus epidemic has affected cybersecurity.

    You will find out:

    • The cyber security challenges of working remotely in the current circumstances
    • Recent threat landscape as seen by Kaspersky and cyber threats related to the Coronavirus epidemic
    • Sneak peeks into the latest private threat intelligence findings by Kaspersky related to META
  • Financial threat landscape: what we’ve seen and how to stay safe Recorded: Apr 14 2020 56 mins
    Dmitry Bestuzhev, Head of Global Research & Analysis Team, Latin America
    Cybercriminals are, more often than not, after money, and that’s why finances have long been a primary target of cybercriminals. However, you can protect yourself and your institution. The first step? Being aware of the ever-evolving ways in which these malicious actors attack.

    Join this webinar with the Head of Kaspersky's Latin America Global Research and Analysis Team (GReAT), Dmitry Bestuzhev, to learn:

    •The techniques and tactics cybercriminals have been using to attack financial institutions in 2019
    •Evolution of mobile malware and banking Trojans
    •How to protect yourself and your organization from becoming compromised
    •New threats in the times of a pandemic

    Keep your finances secure in 2020.
  • Cyber-attacks during the pandemic times Recorded: Apr 9 2020 59 mins
    Vitaly Kamluk, Director, Global Research and Analysis Team, Kaspersky APAC
    A lot of companies are severely underprepared for managing the new ways of working that has resulted from the outbreak of COVID-19. At the same time, we must understand that events like COVID are often attractive opportunities for cybercriminals.

    In this webinar titled "Cyberattacks during pandemic times", Vitaly Kamluk, Director, Global Research and Analysis Team, Kaspersky APAC will explore how Hackers are using the sensitivity and anxieties of people to force them into clicking on unsafe links that can lead to the theft of sensitive data. Fake maps, apps and spear phishing emails linked to COVID 19, Lockdown, WFH targeting end-users have gone up dramatically - join this webinar to understand how you can protect and secure your organization during the Pandemic.
  • Remote workplace: cyber threats and how to protect from them Recorded: Apr 8 2020 17 mins
    Dmitry Galov, Security Researcher, Global Research and Analysis Team, Russia and Andrey Dankevich, Senior marketing manager
    With the recent coronavirus outbreak spreading across the world, more organizations are opting to enable their employees to work remotely to avoid additional risks. However, while staying at home might help with the virus, there still are threats to look out for— in cyberspace. Once a device is taken outside of an organisation’s network infrastructure and connected to new networks and WIFI, the cyber risks broaden and increase. To help organizations gear up for people to work from home and understand the security challenges of remote workplaces, Kaspersky experts will share their review of potential cyber threats and how to avoid them.
    In this webinar you will learn:
    •What threats can thwart remote workers
    •Case studies cyber attacks faced by remote workers
    •How to protect your data and set up a secure workplace anywhere
  • How to find network threats using NIDS Recorded: Apr 7 2020 27 mins
    Tatyana Shishkova, security researcher at Kaspersky
    Protecting corporate networks is a challenging task. In this webinar, I will elaborate on Network Intrusion Detection Systems (NIDS) – one of vital components of security solutions that analyzes network traffic and is used in perimeter protection.

    This webinar will cover the following topics:

    •What is NIDS, how does it work and what are the popular open-source solutions?
    •Which threats can be effectively detected using NIDS?
    •Real-life examples of malicious traffic and rules to catch them
    •Limitations of NIDS and possible workarounds
  • Upping the APT hunting game: learn the best YARA practices from Kaspersky Recorded: Mar 31 2020 76 mins
    Costin Raiu, Director Global Research & Analysis Team (GReAT)
    Have you ever wondered how Kaspersky discovered some of the world’s most famous APT attacks? Now, the answer is within your reach. Costin Raiu, director of Kaspersky’s Global Research and Analysis Team (GReAT), will be sharing best practices on the use of YARA, an essential tool for APT hunters that can assist with the discovery of new malware samples, exploits and zero-days, speed up incident response, and increase your defenses by deploying custom rules inside your organization.

    If you ever wanted to master YARA and achieve a new level of knowledge in APT detection, mitigation and response, now is your chance.

    This brief webinar is based on Kaspersky’s exclusive training on YARA rules, which has already helped improve the APT detection strategies of many cybersecurity teams from leading businesses across the world. During the webinar, you will learn how to write test and improve effective YARA rules. You will also get a glimpse of some of our internal tools and learn how to maximize your knowledge for building effective APT detection strategies with YARA.

    This practical webinar is useful for security researchers and incident response personnel, malware analysts, security engineers, network security analysts, APT researchers and IT security staff. The content is suitable for both beginners and seasoned YARA users.

    During this webinar, you will learn about:

    •YARA syntax
    •Tips & tricks for creating fast and effective rules
    •Using YARA-generators
    •Testing YARA rules for false positives
    •Hunting new undetected samples
    •Using external modules within YARA for effective hunting
    •Anomaly search
    •Real-life examples

    Don’t miss this opportunity to learn about APT threat detection from Kaspersky’s Global Research and Analysis Team.

    Attendees’ requirements:
    Technical level: medium
    Prerequisites: knowledge of basic programming languages
    Software to install: YARA 3.11.0 or newer (if any)

    Learn more about Kaspersky cybersecurity trainings: https://kas.pr/6m8r
  • Prioritizing alerts based on level of risk – a step-by-step guide Recorded: Mar 31 2020 29 mins
    Artem Karasev, Senior Product Marketing Manager, Kaspersky
    The number of security alerts processed by information security analysts every day is growing exponentially. With such a high amount of data being analyzed, effective alert prioritization, triage and validation becomes nearly impossible. There are too many blinking lights coming from numerous security products, leading to significant alerts getting buried in the noise. Analysts need an effective solution to quickly validate the nature of suspicious files, URLs and IP addresses and identify incidents warranting their immediate attention.
    During this webinar, we will provide a step-by-step guide to demonstrate how the Kaspersky Threat Intelligence Portal allows anyone to easily upload suspicious objects and discover if they pose danger to their company.
  • Withstanding the world’s no. 1 attack vector Recorded: Mar 24 2020 65 mins
    Oleg Gorobets, senior global product marketing manager at Kaspersky
    Email offers cybercriminals an multitude of potential attack scenarios. Join our webinar to find out what to expect, and how to protect your business against the world’s no. 1 attack vector.
  • Fin7 APT: how billion dollar crime ring remains active after leaders’ arrest Recorded: Mar 23 2020 39 mins
    Felix Aime, Yury Namestnikov
    When Europol and the DoJ announced the arrest of the leaders of the Fin7 and Carbanak cybercriminal group in 2018, it was believed the group would cease its activity. However, data found in 2019 indicated that the attacks have not only continued but have evolved. Fin7 has extended the number of groups operating under its umbrella, sophisticated its methods and even went on the legitimate job market to hire employees who apparently did not suspect they were working for hackers. The main aim behind Fin7’s malicious activities remained the same though – the stealing of financial assets.

    Сybersecurity experts from Kaspersky Lab’s GReAT team – Yury Namestnikov and Felix Aime – will explain how the new Fin7 activity was detected, which groups are now under its umbrella and how to protect yourself from it.
  • Remote workplace: cyber threats and how to protect from them Recorded: Mar 18 2020 18 mins
    Dmitry Galov, Security Researcher, Global Research and Analysis Team, Russia and Andrey Dankevich, Senior marketing manager
    With the recent coronavirus outbreak spreading across the world, more organizations are opting to enable their employees to work remotely to avoid additional risks. However, while staying at home might help with the virus, there still are threats to look out for— in cyberspace. Once a device is taken outside of an organisation’s network infrastructure and connected to new networks and WIFI, the cyber risks broaden and increase. To help organizations gear up for people to work from home and understand the security challenges of remote workplaces, Kaspersky experts will share their review of potential cyber threats and how to avoid them.
    In this webinar you will learn:
    •What threats can thwart remote workers
    •Case studies cyber attacks faced by remote workers
    •How to protect your data and set up a secure workplace anywhere
  • To Blockchain or Not to Blockchain? Terra Incognita for Enterprises Recorded: Mar 17 2020 59 mins
    Ramy AlDamati – Lead Solution Architect, Blockchain influencer; Pavel Pokrovsky – Blockchain Security Group Manager
    Are you currently developing a project based on distributed ledger? Or simply interested in the technology?

    We will give you a recap of how blockchain technology has become as an integral part of the business process in enterprises. We’ll talk about use cases where distributed ledgers deliver their best value and we’ll also take a look at threat landscape and corresponding cybersecurity measures tailored for blockchain-based systems and provide recommendations on how to make your project secure.

    • About blockchain and distributed ledgers
    • The importance of DLT in numbers
    • Use cases enterprise customers implement in DLT
    • Threat landscape and why cybersecurity is important for DLTs
    • Introducing Kaspersky Enterprise Blockchain Security
  • 2019's evolution of mobile threats Recorded: Mar 17 2020 34 mins
    Victor Chebyshev, research development team lead at Kaspersky
    As our mobile technology continues to evolve, so too do the means and methods by which cybercriminals attack us on these devices. In 2019 alone, there were nearly 70,000 new banking Trojans and nearly 70,000 new mobile ransomware Trojans.

    Kaspersky’s security researcher Victor Chebyshev, an expert in the mobile threat landscape, will discuss the most notable trends and the most significant developments in the mobile malware industry over the last year.

    Join the webinar to discover which types of attacks pose the greatest threat, which are losing popularity, and which put users’ most personal data at risk. Receive predictions for what to expect from mobile threat actors this year and find advice on how you can keep yourself — and your customers — safe.
  • What will make enterprise blockchain adoption successful in 2020? Recorded: Mar 10 2020 33 mins
    Pavel Pokrovsky (Blockchain Security Group Manager, Kaspersky), Peter Fedchenkov (Founder and Chief Revenue Officer, Insolar)
    While many companies in 2019 were just exploring practical business applications for DLT and blockchain, in 2020 we expect a large scaling-up of these projects. Indeed, Gartner listed blockchain as one of the top ten strategic technologies for the next year (Gartner Top Strategic Predictions for 2020 and Beyond).

    However, will they prove their value and deliver the expected ROI?

    Learn how to succeed in your enterprise blockchain deployment by attending a panel discussion with Insolar, a blockchain provider; and Kaspersky, a cybersecurity leader, which will cover:

    1) How to identify your business problem and link it to an investment case
    2) Which type of deployment – public, private or hybrid - fits in each case
    3) In-house or outsourced development - how to define the proper resource allocation
    4) How to build a solid security architecture
    5) How to mitigate scalability and interoperability issues

    Following the session, you will come away with practical tips on how to achieve success in your enterprise blockchain or DLT project.
Latest on cyberthreats and protection technologies
Top-notch cybersecurity and protection technology experts share their knowledge on how to mitigate the most dangerous cyberthreats that any organization may face. Contact us at https://www.kaspersky.com/about/contact

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The ransomware ecosystem: how it functions and how to protect against it
  • Live at: May 12 2020 2:00 pm
  • Presented by: Ivan Kwiatkowski, Senior Security Researcher, GReAT EU
  • From:
Your email has been sent.
or close