Hi [[ session.user.profile.firstName ]]

The Hacker’s Mind: Episode #3 - The Payload and Execution

To really protect your business from cyber threats, you have to better understand your enemy.

In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:

This episode focuses on: What is a good payload consists of and what do attackers have to bear in mind when planning and writing down their payload.

Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.

• How hackers plan their attacks (episode #1)
• How hackers deliver attacks to your computer (episode #2)
• The payload and execution (episode #3)
• How to stop the cyber cat & mouse game (episode #4)
Recorded May 5 2020 15 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Roy Rashti, Head of Presale & Professional Services at BitDam
Presentation preview: The Hacker’s Mind: Episode #3 - The Payload and Execution
  • Channel
  • Channel profile
  • The Hacker’s Mind: Episode #4 - How to Stop the Cyber Cat & Mouse Game Dec 16 2020 4:00 pm UTC 11 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    To really protect your business from cyber threats, you have to better understand your enemy.

    In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:

    This episode focuses on: How do security solutions work, how effective are they and how can the good actors win this never-ending-cat-and-mouse game?

    Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.

    • How hackers plan their attacks (episode #1)
    • How hackers deliver attacks to your computer (episode #2)
    • The payload and execution (episode #3)
    • How to stop the cyber cat & mouse game (episode #4)
  • The Hacker’s Mind: Episode #3 - The Payload and Execution Dec 9 2020 4:00 pm UTC 14 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    To really protect your business from cyber threats, you have to better understand your enemy.

    In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:

    This episode focuses on: What is a good payload consists of and what do attackers have to bear in mind when planning and writing down their payload.

    Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.

    • How hackers plan their attacks (episode #1)
    • How hackers deliver attacks to your computer (episode #2)
    • The payload and execution (episode #3)
    • How to stop the cyber cat & mouse game (episode #4)
  • The Hacker’s Mind: Episode #2 - How Hackers Deliver Attacks to Your Computer Dec 2 2020 4:00 pm UTC 12 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    To really protect your business from cyber threats, you have to better understand your enemy.

    In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:

    This episode focuses on droppers - how are they delivered to the end user, how do they evade detection and how do they execute the payload.

    Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.

    • How hackers plan their attacks (episode #1)
    • How hackers deliver attacks to your computer (episode #2)
    • The payload and execution (episode #3)
    • How to stop the cyber cat & mouse game (episode #4)
  • The Hacker’s Mind: Episode #1 - How Hackers Plan Their Attacks Recorded: Nov 25 2020 17 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    To really protect your business from cyber threats, you have to better understand your enemy.

    In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:

    • How hackers plan their attacks (episode #1)
    • How hackers deliver attacks to your computer (episode #2)
    • The payload and execution (episode #3)
    • How to stop the cyber cat & mouse game (episode #4)


    Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.
  • Get into the Phisher's Mind: Cashing Out - Episode 4 Recorded: Nov 10 2020 10 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    Join us in this four part video series with BitDam’s Cyber Expert, Roy Rashti, who will share some of the phisher’s secrets. Gain a perspective of how phishers plan their scams, how they operate and how you can protect from them.

    In this episode we will cover the phisher’s reward:

    Using the stolen assets
    What makes phishing attacks so popular and lucrative
    Why phishing attacks are still successful
    How to avoid being tricked and what to look out for
  • Get into the Phisher's Mind: The Mind Game - How to Penetrate your Target - Ep 3 Recorded: Nov 3 2020 14 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    Join us in this four part video series with BitDam’s Cyber Expert, Roy Rashti, who will share some of the phisher’s secrets. Gain a perspective of how phishers plan their scams, how they operate and how you can protect from them.

    In this episode we will cover:

    How phishers design their attack
    Selecting the most suitable host
    Looks is everything - choosing the right attack look
    Distributing the attack: spraying vs. cherry picking
    The newest evasion techniques
  • Get into the Phisher's Mind: The Hunt - Attacker Victim Relationship - Episode 2 Recorded: Oct 27 2020 15 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    Join us in this four part video series with BitDam’s Cyber Expert, Roy Rashti, who will share some of the phisher’s secrets. Gain a perspective of how phishers plan their scams, how they operate and how you can protect from them.

    In this episode we will cover the main decisions taken by phishers:

    Picking the prey: business, government or individuals
    Selecting the brand to go after
    Which companies are more vulnerable to phishers
    The luring mechanism and attack packaging
  • Get into the Phisher's Mind: The Phishing Landscape - Episode 1 Recorded: Oct 21 2020 13 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    To beat your enemies, you must know how they work. In this series of video talks, BitDam’s Cyber Expert, Roy Rashti, will share some of the phisher’s secrets. Getting into the phisher’s mind, episode #1 will cover:

    · What’s phishing and how it all started
    · Who is the phisher and what motivates them?
    · How phishers select their prey
    · Phisher’s interruptions and how to overcome them

    Join us to get a perspective of how phishers plan their scams, how they operate and how you can protect from it.
  • CISOs Panel Discussion: Securing remote collaboration during a pandemic Recorded: Aug 13 2020 35 mins
    Michael Sherwood, City of Las Vegas Norman McKeown, LSH Auto UK Limited Daniel Baird, Grahams the Family Dairy
    Join BitDam’s CEO & Co-Founder, Liron Barak, as she hosts CISOs for discussion on the hottest cybersecurity topics nowadays including:

    - WFH and the implications on organizations’ information security
    - Protecting from ransomware and phishing across all collaboration platforms
    - How to deal with the inevitable malware detection gap

    Panelists:

    Michael Sherwood, City of Las Vegas
    Norman McKeown, LSH Auto UK Limited
    Daniel Baird, Grahams the Family Dairy Ltd
  • How to Assess Your Email Vulnerability for Free in 20 Minutes? Recorded: Jul 22 2020 16 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    As a cybersecurity professional, you want to be aware of your email security flaws. You may even consider deploying a Breach & Attack Simulation tool. Did you know that you can do it yourself within minutes?

    Join our Cyber Expert, Roy Rashti for a practical DIY session on how to assess your email security. The live session will include:

    - Introduction to 2 free non-intrusive Breach & Attack Simulation tools
    - How to use these tools safely
    - Live demos including installation and usage
    - How to read a Breach & Attack Simulation report

    Following this session, you will be able to test your email security by yourself in less than 20 minutes, and get continuous insight into which threat types penetrate your organization. All that using free tools.
  • The Hacker’s Mind: Episode #4 - How to Stop the Cyber Cat & Mouse Game Recorded: Jul 9 2020 11 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    To really protect your business from cyber threats, you have to better understand your enemy.

    In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:

    This episode focuses on: How do security solutions work, how effective are they and how can the good actors win this never-ending-cat-and-mouse game?

    Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.

    • How hackers plan their attacks (episode #1)
    • How hackers deliver attacks to your computer (episode #2)
    • The payload and execution (episode #3)
    • How to stop the cyber cat & mouse game (episode #4)
  • The Hacker’s Mind: Episode #3 - The Payload and Execution Recorded: Jul 2 2020 14 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    To really protect your business from cyber threats, you have to better understand your enemy.

    In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:

    This episode focuses on: What is a good payload consists of and what do attackers have to bear in mind when planning and writing down their payload.

    Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.

    • How hackers plan their attacks (episode #1)
    • How hackers deliver attacks to your computer (episode #2)
    • The payload and execution (episode #3)
    • How to stop the cyber cat & mouse game (episode #4)
  • The Hacker’s Mind: Episode #2 - How Hackers Deliver Attacks to Your Computer Recorded: Jun 25 2020 12 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    To really protect your business from cyber threats, you have to better understand your enemy.

    In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:

    This episode focuses on droppers - how are they delivered to the end user, how do they evade detection and how do they execute the payload.

    Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.

    • How hackers plan their attacks (episode #1)
    • How hackers deliver attacks to your computer (episode #2)
    • The payload and execution (episode #3)
    • How to stop the cyber cat & mouse game (episode #4)
  • The Hacker’s Mind: Episode #1 - How Hackers Plan Their Attacks Recorded: Jun 18 2020 17 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    To really protect your business from cyber threats, you have to better understand your enemy.

    In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:

    • How hackers plan their attacks (episode #1)
    • How hackers deliver attacks to your computer (episode #2)
    • The payload and execution (episode #3)
    • How to stop the cyber cat & mouse game (episode #4)


    Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.
  • How to Assess Your Email Vulnerability for Free in 20 Minutes? Recorded: Jun 2 2020 17 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    As a cybersecurity professional, you want to be aware of your email security flaws. You may even consider deploying a Breach & Attack Simulation tool. Did you know that you can do it yourself within minutes?

    Join our Cyber Expert, Roy Rashti for a practical DIY session on how to assess your email security. The live session will include:

    - Introduction to 2 free non-intrusive Breach & Attack Simulation tools
    - How to use these tools safely
    - Live demos including installation and usage
    - How to read a Breach & Attack Simulation report

    Following this session, you will be able to test your email security by yourself in less than 20 minutes, and get continuous insight into which threat types penetrate your organization. All that using free tools.
  • Email Security: How to Protect from the Unknown with Simon Crosby Recorded: May 27 2020 35 mins
    Simon Crosby, Co-founder, Bromium and Maor Hizkiev, Co-Founder and CTO, BitDam
    BitDam hosts Bromium Co-Founder, Simon Crosby, discussing the newest unknown cyber threats, why model-driven security can protect from them, and how this can be done in scale with no interference to productivity.

    Can BitDam’s attack-agnostic approach really deal with the growing problem of unknown threats?

    Join us in this one-time discussion to better understand:

    - What makes rapidly evolving unknown threats our No. 1 enemy
    - The gaps of data-driven email security
    - Why model-driven security is the only way to deal with these threats
    - How to scale it while keeping end-user’s productivity
    - The actions you need to take to protect your organization’s email from these unknowns


    Sometimes 100% cybersecurity is not science fiction. Join us to hear Simon Crosby’s take on that!
  • The Hacker’s Mind: Episode #4 - How to Stop the Cyber Cat & Mouse Game Recorded: May 19 2020 12 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    To really protect your business from cyber threats, you have to better understand your enemy.

    In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:

    This episode focuses on: How do security solutions work, how effective are they and how can the good actors win this never-ending-cat-and-mouse game?

    Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.

    • How hackers plan their attacks (episode #1)
    • How hackers deliver attacks to your computer (episode #2)
    • The payload and execution (episode #3)
    • How to stop the cyber cat & mouse game (episode #4)
  • Email Security: How to Protect from the Unknown with Simon Crosby Recorded: May 5 2020 36 mins
    Simon Crosby, Co-founder, Bromium and Maor Hizkiev, Co-Founder and CTO, BitDam
    BitDam hosts Bromium Co-Founder, Simon Crosby, discussing the newest unknown cyber threats, why model-driven security can protect from them, and how this can be done in scale with no interference to productivity.

    Can BitDam’s attack-agnostic approach really deal with the growing problem of unknown threats?

    Join us in this one-time discussion to better understand:

    - What makes rapidly evolving unknown threats our No. 1 enemy
    - The gaps of data-driven email security
    - Why model-driven security is the only way to deal with these threats
    - How to scale it while keeping end-user’s productivity
    - The actions you need to take to protect your organization’s email from these unknowns


    Sometimes 100% cybersecurity is not science fiction. Join us to hear Simon Crosby’s take on that!
  • The Hacker’s Mind: Episode #3 - The Payload and Execution Recorded: May 5 2020 15 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    To really protect your business from cyber threats, you have to better understand your enemy.

    In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:

    This episode focuses on: What is a good payload consists of and what do attackers have to bear in mind when planning and writing down their payload.

    Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.

    • How hackers plan their attacks (episode #1)
    • How hackers deliver attacks to your computer (episode #2)
    • The payload and execution (episode #3)
    • How to stop the cyber cat & mouse game (episode #4)
  • CBTS & BitDam Present: The Blind Spots of Email Security Nobody Speaks About Recorded: Apr 30 2020 37 mins
    Brian Kubas at CBTS, Maor Hizkiev at BitDam and Roy Rashti, BitDam
    We invite you to join CBTS and BitDam for "The Blind Spots of Email Security Nobody Speaks About" as we discuss the shocking miss rates from leading providers: O365 ATP, Proofpoint TAP and G Suite Enterprise. Learn what blind spots your organization may have within your current email security.


    Join Brian Kubas, Network & Security Product Specialist at CBTS, Maor Hizkiev CTO & Co-founder at BitDam and Roy Rashti, Presale and Professional Services at BitDam to learn:

    - Why leading email security products show 23-35% miss rates
    - What is the cause of this huge detection gap?
    - How to protect your organization from these unknown threats
For SOC professionals who want to solve malware once & for all
BitDam brings a pioneering approach to protection against malware.

Its cloud-based Advanced Threat Protection (ATP) blocks content-borne attacks delivered via email, cloud storage, and Instant Messaging, empowering organizations to collaborate safely.

Using an attack-agnostic technology, BitDam shows unprecedented detection rates, blocking malware from first sight.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Hacker’s Mind: Episode #3 - The Payload and Execution
  • Live at: May 5 2020 12:30 pm
  • Presented by: Roy Rashti, Head of Presale & Professional Services at BitDam
  • From:
Your email has been sent.
or close