Hi [[ session.user.profile.firstName ]]

Top 5 Office 365 Phishing Kits to Watch For

Have you noticed an uptick in phishing traffic reaching your company’s users? Been impressed by the sophistication of so many phishing sites? Phishing has become an industry, with new services and sophisticated turn-key “phishing kits” allowing nearly anyone to develop sophisticated attacks.

In this webinar, senior threat researcher Magni Sigurdsson will share the latest findings on phishing kits, including which brands are the most targeted, and go in-depth on the five most-used phishing kits, showing actual examples, reviewing the mechanics of how they work—including the evasive tactics utilized to evade detection—and explaining how both users and security systems can recognize them.

What You Will Learn
This webinar provides IT and security professionals from network admins to CISO’s the opportunity to understand the latest techniques being used by phishing sites to lure in users, and to get up to speed on the tactics of the top phishing kits being utilized. Takeaways will include:
• What are the top phishing kits today in terms of “market share” that users are likely to encounter?
• What brands are being targeted by the phishing kit industry?
• What techniques are being applied to phishing web sites and phishing campaigns in general) to evade detection?
• How can users identify the most sophisticated phishing web sites? How can security systems do so?
• What are the key phishing trends to look out for in 2019?
Recorded Feb 28 2019 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Magni Sigurdsson - Senior Threat Researcher, Cyren
Presentation preview: Top 5 Office 365 Phishing Kits to Watch For

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • What Are You Doing About Office 365 Phishing Security? Jun 27 2019 2:00 pm UTC 60 mins
    Michael Osterman, Principal Analyst, Osterman Research
    This webinar will present insights from an in-depth survey of IT and Security professionals at large enterprise companies (5000 or more employees) using Office 365 for their corporate email. Covering the following fundamentals: Security Performance, Security Operations Centers, SIEM Integration, Office 365 migration, Budget growth, User reporting and other top ongoing concerns along with views on new defensive technologies and services.

    Covering organizations in both the US and UK, this webinar, with the survey report (of which a copy will be provided to all webinar participants) provide IT and Security professionals, the opportunity to benchmark their own Office 365 security posture and planning with answers from their peers.
  • Why You Need Third-Party Solutions for Office 365 Jun 6 2019 9:00 am UTC 49 mins
    Michael Osterman, Principal Analyst, Osterman Research
    Office 365 is a capable and robust platform with a wide collection of features and functions. Like any large platform with diverse capabilities and a diverse user base, customers must analyze if it provides the depth of capability or specialized functionality they require in areas like security, archiving, authentication, eDiscovery, encryption, and file sharing.

    To help IT and security managers identify such features or performance gaps, Osterman Research has just published “Why Your Company Needs Third-Party Solutions for Office 365.”

    Join Michael Osterman, Principal Analyst, Osterman Research will review the results contained in the report of detailed research into Office 365’s functionality across several areas.

    Takeaways will include:
    • How prevalent it is for IT organizations using Office 365 today to contract additional security, archiving or other capabilities
    • Limitations in the embedded security included in standard Office 365 packages
    • Considerations in evaluating Microsoft’s Advanced Threat Protection module
    • What is needed to make Office 365’s eDiscovery capabilities really work for you
    • What particular issues must be understood by companies with hybrid environments

    *A complimentary copy of the report will be provided to all webinar attendees.
  • Top 5 Office 365 Phishing Kits to Watch For Jun 4 2019 9:00 am UTC 50 mins
    Magni Sigurdsson - Senior Threat Researcher, Cyren
    Have you noticed an uptick in phishing traffic reaching your company’s users? Been impressed by the sophistication of so many phishing sites? Phishing has become an industry, with new services and sophisticated turn-key “phishing kits” allowing nearly anyone to develop sophisticated attacks.

    Join Magni Sigurdsson, Senior Threat Researcher, Cyren as he shares the latest findings on phishing kits, including which brands are the most targeted, the five most-used phishing kits, showing actual examples, reviewing the mechanics of how they work and explaining how both users and security systems can recognize them.

    Takeaways will include:
    • The key phishing trends to look out for in 2019
    • The top phishing kits today in terms of “market share” that users are likely to encounter
    • Techniques that are being applied to phishing web sites and phishing campaigns
    • How users can identify the most sophisticated phishing web sites
  • Gap Analysis Measures the Effectiveness of Your Email Security May 23 2019 2:00 pm UTC 60 mins
    Stuart Grierson, Lead Senior Solutions Engineer and Duncan Mills, Product Marketing Director
    Whether you use Office 365, a cloud email security service or an on-premises gateway, you should periodically test its effectiveness. This will allow you to quantify how much malware, phishing and spam is evading your email security and getting through to your users.
    Cyren has developed an Email Security Gap Analysis assessment to measure how well a company’s in-place security is performing. Aggregated data on results from assessments done in 2018 have been published and this webinar will review findings in that report, including:
    • Key statistics
    • Case studies and segmented industry data
    • Example emails and threats uncovered during assessments (appropriately anonymized)
    You will also find out how to have your own gap analysis done free of charge.
  • New Attack Vectors: How Threats Have Changed and How to Combat Them Recorded: Apr 25 2019 63 mins
    Tom McNash, Senior Solutions Engineer, Cyren
    In this webinar, Senior Solutions Engineer Tom McNash will review how new threat attack vectors are working, how cyber criminals are building threats in new ways today—whether for malware, phishing or denial-of-service attacks--and what security approach businesses need to be adapting to defend against these attacks. He will also explain how the profile of attackers targeting businesses is changing, and how one traditional form of defence against sophisticated attacks—the appliance sandbox—has itself become the object of attacks.
  • Evasive Phishing Targeting Office 365: What You Need to Know Recorded: Apr 17 2019 45 mins
    Magni Sigurdsson, Senior Threat Researcher, Cyren and Duncan Mills, Director of Product, Cyren
    About This Live Webinar
    Have you noticed an uptick in phishing traffic reaching your company’s users? Phishing has become an industry, with new methods appearing and new “dark web” services increasing the evasiveness and sheer volume of both mass and targeted phishing threats.

    In this webinar, Cyren’s senior threat analysts will explain the latest phishing techniques and dissect examples of Office 365-targeted phishing campaigns, review how the phishing “industry” works today, and align these developments with data from real-world security performance assessments, in order to inform Office 365 administrators and IT managers as they choose among approaches to security.

    What You Will Learn:
    In this webinar, Cyren’s senior threat analysts will explain the latest phishing techniques and dissect examples of Office 365-targeted phishing campaigns, review how the phishing “industry” works today, and align these developments with data from a recent survey of Office 365 deployments, in order to inform Office 365 administrators and IT managers as they choose among approaches to security.
    Takeaways will include:
    • What phishing campaigns are targeting Office 365 today, what do they look like, and how do they work?
    • What are the latest techniques being used in phishing campaigns to avoid detection?
    • What phishing services are now being provided on the dark web, and what Office 365 credential “phishing kits” are being sold?
    • Are more mass-mailed phishing and targeted phishing campaigns reaching Office 365 users, and if so, by how much has each increased during the past 12 months?
  • Email Security: Why It Probably Isn’t Working, and What To Do Recorded: Apr 4 2019 47 mins
    Michael Osterman of Osterman Research
    Why is email security back on everybody’s agenda?
    Why do email security solutions seem to be improving only slightly in certain areas, and getting worse in others? Or is that not true?
    In the midst of the current phishing and ransomware epidemic, security must get better – but how?

    View this on-demand webinar to hear Michael Osterman of Osterman Research share the responses he received when he recently put these questions to IT managers and security practitioners, and benefit from the insights of an accompanying research paper laying out the reasons for the growing rate of “Business Email Compromise” and what must be done.
  • IT-Sicherheit 2019: Ausgeklügelte Phishing und Malware Attacken wie Emotet, Ryuk Recorded: Mar 21 2019 58 mins
    Marcel Leitel, Sales Engineer DACH Cyren
    Die Flut an Cyberattacken ist im vergangenen Jahr deutlich angestiegen und werden in 2019 immer intelligenter und raffinierter. Attacken wie Emotet und TrickBot machten im Januar und Februar ein großer Anteil der Phishing-Angriffe aus. Die Eindringlinge haben es nicht nur auf die IT-Spezialisten in Unternehmen, sondern auch auf Ihre Mitarbeiter abgesehen.

    Unternehmen begegnen dieser Herausforderung häufig mit einer Vielzahl von Sicherheitslösungen nach dem Best-of-Breed-Ansatz. Ein aufwendiges Management, mangelnde Integration und nicht erkannte Sicherheitslücken sind die Folge.
  • Phishing Security for Enterprises using Office 365 Recorded: Mar 7 2019 58 mins
    Michael Osterman, Principal Analyst, Osterman Research and Pete Starr, Senior Director of Solution Engineering, Cyren
    About this live webinar
    The Microsoft Office 365 platform currently blocks over 5 billion phishing messages a year. But as mass and targeted phishing attacks increase in volume, speed and evasiveness, is additional protection needed to secure Office 365 email for your organization?

    To answer this question, Osterman Research’s principal analyst will share insights from a recent study of Office 365 deployments, and Cyren’s global director of solution engineering will walk through the phishing kill chain and point to practical opportunities to enhance defences.


    What you will learn

    This webinar provides IT and security professionals the opportunity to understand phishing security issues for Office 365 deployments. Takeaways will include:
    •What is the current experience of Office 365 deployments in terms of phishing security?
    •What are typical limitations for Office 365 deployments in dealing with today’s phishing threat landscape?
    •Considering how phishing attacks work, what countermeasures are available at each stage?
    •What are 10 steps organizations using Office 365 can take to stop phishing attacks?
  • How to choose the right Email & Web Security to complement Microsoft Office 365 Recorded: Jan 31 2019 45 mins
    Duncan Mills - Product Marketing Director Cyren
    The choices available to those evaluating email and web security products and services today are many and confusing. Smaller and mid-sized enterprises will often not have the luxury of a team of staff to do the research and technical evaluation, nor will they have access to third party analyst research to guide them.

    For companies that have migrated to Office 365 or are planning to, the inclusion of some bundled, basic email security exacerbates the complexity of this process.

    What you will learn
    • The most prevalent cyber threats faced by businesses using Office 365
    • The business traits that impact the types of threats you face
    • Which security solutions make the most sense within the context of your business
    • Why email and web security are critically important
    • How to evaluate email and web security solutions
  • Geschicktes Phishing zielt auf Office 365: Was Sie wissen sollten! Recorded: Dec 6 2018 56 mins
    Marcel Leitel, Sales Engineer DACH Cyren
    Ist Ihnen ein Anstieg an Phishing-Verkehr, der Ihre Mitarbeitern erreicht, aufgefallen? Phishing ist eine Industrie geworden, mit neuen Methoden und neuen „Dark Web“-Diensten, die immer schwerer zu erkennen sind und schon durch das bloße Volumen von Massen- und gezielten Phishings auffallen.

    In diesem Webinar wird Marcel Leitel, die neuen Phishing-Technologien erläutern wie auch Beispiele von auf Office-365 zielende Phishing-Kampagnen aufzeigen. Erfahren Sie, wie die heutige Phishing-Industrie funktioniert und gleichen Sie diese Entwicklungen mit den Ergebnissen einer neuen Untersuchung zu Office-365 ab, die Office-365-Administratoren und IT-Manager bei der Auswahl der verschiedenen Sicherheitskonzepte unterstützt.

    Dieses Webinar bietet IT- und Sicherheits- Spezialisten die Möglichkeit, dass bei Office 365 eingesetzte Phishing Phänomen zu verstehen und das Wissen bei der Auswahl ihrer Firmen-Sicherheitsstrategie anzuwenden. Kernlernpunkte sind:

    - Welche Phishing Kampagnen zielen heute auf Office 365? Wie sehen diese aus und wie funktionieren sie?
    - Welche neuesten Techniken werden von Phishing-Kampagnen eingesetzt, um Erkennung zu verhindern?
    - Welche Phishing-Dienste werden im Dark Web angeboten und welche Office 365 ‚phishing kits‘ werden verkauft?
    - Erreichen mehr Massen-Phishings und gezielte Phishing-Kampagnen Office 365 Nutzer und wenn ja, um wie viel ist dies in den letzten 12 Monaten angestiegen?
  • Confronting the Ransomware Crisis: Best Practices for Securing Your Business Recorded: Dec 5 2018 44 mins
    Dan Maier, VP Marketing
    Ransomware such as CryptoLocker, CryptoWall and Locky are targeting businesses with massive hybrid cyber-attacks that leverage both email and the web to fool your employees and penetrate your cyber-defenses. These attacks encrypt all the files on your employees’ computers and demand ransom payments via Bitcoin to decrypt the data.

    So far, law enforcement has been helpless against these attacks, and IT teams are struggling to protect their organizations from these sophisticated threats.

    View this on-demand webinar broadcast to learn how ransomware attacks happen and what you can do to protect your business from them.
  • Evasive Phishing Targeting Office 365: What You Need to Know Recorded: Dec 3 2018 46 mins
    Magni Sigurdsson, Senior Threat Researcher, Cyren and Duncan Mills, Director of Product, Cyren
    About This Live Webinar
    Have you noticed an uptick in phishing traffic reaching your company’s users? Phishing has become an industry, with new methods appearing and new “dark web” services increasing the evasiveness and sheer volume of both mass and targeted phishing threats.

    In this webinar, Cyren’s senior threat analysts will explain the latest phishing techniques and dissect examples of Office 365-targeted phishing campaigns, review how the phishing “industry” works today, and align these developments with data from real-world security performance assessments, in order to inform Office 365 administrators and IT managers as they choose among approaches to security.

    What You Will Learn:
    In this webinar, Cyren’s senior threat analysts will explain the latest phishing techniques and dissect examples of Office 365-targeted phishing campaigns, review how the phishing “industry” works today, and align these developments with data from a recent survey of Office 365 deployments, in order to inform Office 365 administrators and IT managers as they choose among approaches to security.
    Takeaways will include:
    • What phishing campaigns are targeting Office 365 today, what do they look like, and how do they work?
    • What are the latest techniques being used in phishing campaigns to avoid detection?
    • What phishing services are now being provided on the dark web, and what Office 365 credential “phishing kits” are being sold?
    • Are more mass-mailed phishing and targeted phishing campaigns reaching Office 365 users, and if so, by how much has each increased during the past 12 months?
  • Phishing Security for Office 365 Recorded: Nov 29 2018 59 mins
    Michael Osterman, Principal Analyst, Osterman Research and Pete Starr, Senior Director of Solution Engineering, Cyren
    About this live webinar
    The Microsoft Office 365 platform currently blocks over 5 billion phishing messages a year. But as mass and targeted phishing attacks increase in volume, speed and evasiveness, is additional protection needed to secure Office 365 email for your organization?

    To answer this question, Osterman Research’s principal analyst will share insights from a recent study of Office 365 deployments, and Cyren’s global director of solution engineering will walk through the phishing kill chain and point to practical opportunities to enhance defences.


    What you will learn

    This webinar provides IT and security professionals the opportunity to understand phishing security issues for Office 365 deployments. Takeaways will include:
    •What is the current experience of Office 365 deployments in terms of phishing security?
    •What are typical limitations for Office 365 deployments in dealing with today’s phishing threat landscape?
    •Considering how phishing attacks work, what countermeasures are available at each stage?
    •What are 10 steps organizations using Office 365 can take to stop phishing attacks?
  • Email Security: Why It Probably Isn’t Working, and What To Do Recorded: Nov 26 2018 48 mins
    Michael Osterman of Osterman Research
    Why is email security back on everybody’s agenda?
    Why do email security solutions seem to be improving only slightly in certain areas, and getting worse in others? Or is that not true?
    In the midst of the current phishing and ransomware epidemic, security must get better – but how?

    View this on-demand webinar to hear Michael Osterman of Osterman Research share the responses he received when he recently put these questions to IT managers and security practitioners, and benefit from the insights of an accompanying research paper laying out the reasons for the growing rate of “Business Email Compromise” and what must be done.
  • Best Practices to Combat Ransomware: Petya, WannaCry and Future Attacks Recorded: Nov 16 2018 44 mins
    Dan Maier, VP of Marketing at Cyren
    Ransomware such as Petya and WannaCry are targeting businesses with massive hybrid cyber-attacks that leverage both email and the web to fool your employees and penetrate your cyber-defences. These attacks encrypt all the files on your employees’ computers and demand ransom payments via Bitcoin to decrypt the data.

    So far, law enforcement has been helpless against these attacks, and IT teams are struggling to protect their organizations from these sophisticated threats.

    Download this webinar to learn how ransomware attacks happen and what you can do to protect your business from them.
  • Is It Time to Move Your Security to the Cloud? Recorded: Nov 13 2018 39 mins
    Dan Maier, VP of Marketing at Cyren
    Despite spending an estimated $85B on security in 2016, the volume of malicious attacks has grown dramatically, billions of records have been stolen, and data breaches are at an all-time high.

    The traditional choice for internet security used to be appliances deployed at the network perimeter, but the world has changed, and this model is not working as well as it used to.

    View this on-demand webinar to learn about the challenges that a cloud first, mobile first world poses for legacy security appliances, and the benefits that a cloud-based approach to security can deliver.
  • Email Security Gap Analysis: How Do You Know Your Security Is Working? Recorded: Nov 8 2018 43 mins
    Tom McNash, Senior Solution Engineer
    A decade ago, email threats were well understood and reasonably under control, leading email security to become “commoditized” and vendors to diversify into other services, losing focus on security. This lack of investment and innovation in email security is evident in the success of modern threats like ransomware and phishing, and begs the question ‘How much malware, phishing and spam is really getting through to my users?’

    Cyren has developed a free Email Security Gap Analysis test in order to measure how well a company’s in-place security is performing relative to detection by Cyren’s global security cloud, and recently published a report with aggregated data on results from assessments done in September and October. The webinar will cover a discussion of the findings in that report, additional insights and threat examples uncovered during assessments (appropriately anonymized), and how to have your own gap analysis done.

    Participants in the webinar will come away with a sense of:

    - How much spam, malware and phishing are current email security systems missing?
    - What was the range of results for different assessment participants, considering different case studies?
    - What factors drive higher or lower “miss” rates for malicious emails, even for systems provided by the same security vendor?
    - What might be an expectation for my own company’s security?
    - How is an email gap analysis conducted?
    - What is involved in terms of configuration and are there any impacts to current email operations?
    - How can I arrange to run an Email Security Gap Analysis for my own company?
    - What are the eligibility requirements?
  • Evasive Phishing Targeting Office 365: What You Need to Know Recorded: Oct 25 2018 46 mins
    Magni Sigurdsson, Senior Threat Researcher, Cyren and Duncan Mills, Director of Product, Cyren
    About This Live Webinar
    Have you noticed an uptick in phishing traffic reaching your company’s users? Phishing has become an industry, with new methods appearing and new “dark web” services increasing the evasiveness and sheer volume of both mass and targeted phishing threats.

    In this webinar, Cyren’s senior threat analysts will explain the latest phishing techniques and dissect examples of Office 365-targeted phishing campaigns, review how the phishing “industry” works today, and align these developments with data from real-world security performance assessments, in order to inform Office 365 administrators and IT managers as they choose among approaches to security.

    What You Will Learn:
    In this webinar, Cyren’s senior threat analysts will explain the latest phishing techniques and dissect examples of Office 365-targeted phishing campaigns, review how the phishing “industry” works today, and align these developments with data from a recent survey of Office 365 deployments, in order to inform Office 365 administrators and IT managers as they choose among approaches to security.
    Takeaways will include:
    • What phishing campaigns are targeting Office 365 today, what do they look like, and how do they work?
    • What are the latest techniques being used in phishing campaigns to avoid detection?
    • What phishing services are now being provided on the dark web, and what Office 365 credential “phishing kits” are being sold?
    • Are more mass-mailed phishing and targeted phishing campaigns reaching Office 365 users, and if so, by how much has each increased during the past 12 months?
  • Threats Over SSL: Why Inspecting HTTPS Traffic Is No Longer Optional Recorded: Oct 22 2018 45 mins
    Sigurdur Stefnisson, VP of Threat Research CYREN
    To maintain security, how critical is it really to inspect web traffic that is encrypted via SSL? Here we review global SSL traffic trends and share insights from analysis of traffic through Cyren’s global security cloud.

    Webinar participants will be presented with newly researched data and expert perspectives on several aspects of the SSL question, including:

    - Global tendencies in and drivers of encrypted web traffic
    - The prevalence of inspection of SSL traffic at companies today
    - A breakdown of the types of threats currently hiding in SSL-encrypted traffic
    - Some of the practical challenges associated with inspecting HTTPS traffic, and how such traffic inspection is best accomplished
Cyren Webinars
More than 1.3 billion users around the world rely on Cyren’s 100% cloud internet security solutions to protect them against cyber attacks and data loss every day. Powered by the world’s largest security cloud, Cyren delivers fast time to protection from cyber threats with award-winning Security as a Service for email, sandboxing, and DNS for enterprises, and embedded threat intelligence solutions for security vendors and service providers. Customers like Google, Microsoft and Check Point are just a few of the businesses that depend on Cyren every day to power their security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Top 5 Office 365 Phishing Kits to Watch For
  • Live at: Feb 28 2019 3:00 pm
  • Presented by: Magni Sigurdsson - Senior Threat Researcher, Cyren
  • From:
Your email has been sent.
or close