Hi [[ session.user.profile.firstName ]]

The Cybercriminal Forum is Not Dead

With cybercriminals carrying out more transactions and discussions on alternative platforms, it would seem that forums would decrease. However, this does not seem to be materializing. In fact, forums appear to be flourishing against all odds.

In this webinar, our team dives into our recent research around cybercriminal forums to understand why forums are flourishing in a world of alternative technologies.
Recorded Jun 2 2020 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Stewart Bertram
Presentation preview: The Cybercriminal Forum is Not Dead

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Podcast: Hacktivist Chooses Destruction Over Profit w/ Ransomware Jul 21 2020 6:00 pm UTC 27 mins
    Viktoria Austin
    Pietro, Viktoria, Adam, and Demelza cover this week’s top threat intelligence stories, including a Hacktivist group choosing destruction over profit with ransomware.

    Other stories this week include
    - EasyJet breach
    - Collection 1 Hacker Identified
    - Fin7 Member Arrested
    - iOS Mail App Vulnerability
  • Podcast: Hacktivist Chooses Destruction Over Profit w/ Ransomware Jul 21 2020 9:30 am UTC 27 mins
    Viktoria Austin
    Pietro, Viktoria, Adam, and Demelza cover this week’s top threat intelligence stories, including a Hacktivist group choosing destruction over profit with ransomware.

    Other stories this week include
    - EasyJet breach
    - Collection 1 Hacker Identified
    - Fin7 Member Arrested
    - iOS Mail App Vulnerability
  • Webinar: Outside-In Intelligence for DevSecOps Jul 16 2020 5:00 pm UTC 21 mins
    Michael Marriott, Senior Product Marketing Manager
    Today's development practices lead to increased exposure, and it's on the security team to protect the business. The recent Verizon Data Breach Incident Report 2020 states that errors are now more common than malware in data breach incidents. While misconfigurations accounted for 20% of all error varieties in 2018, this doubled to over 40% in 2019.

    Join Michael Marriott, PMM at Digital Shadows, to see how Digital Shadows provides outside-in intelligence for DevSecOps risks.

    Attendees of this webinar will learn how SearchLight helps:
    - Discover employees exposing code, with the new ‘Unauthorized Commit to a Public Code Repository’ alert
    - Gain intelligence on vulnerabilities
    - Detect file stores on open ports
    - Detect exposed passwords and access keys
  • Webinar: Outside-In Intelligence for DevSecOps Jul 16 2020 10:00 am UTC 21 mins
    Michael Marriott, Senior Product Marketing Manager
    Today's development practices lead to increased exposure, and it's on the security team to protect the business. The recent Verizon Data Breach Incident Report 2020 states that errors are now more common than malware in data breach incidents. While misconfigurations accounted for 20% of all error varieties in 2018, this doubled to over 40% in 2019.

    Join Michael Marriott, PMM at Digital Shadows, to see how Digital Shadows provides outside-in intelligence for DevSecOps risks.

    Attendees of this webinar will learn how SearchLight helps:
    - Discover employees exposing code, with the new ‘Unauthorized Commit to a Public Code Repository’ alert
    - Gain intelligence on vulnerabilities
    - Detect file stores on open ports
    - Detect exposed passwords and access keys
  • Podcast: Torigon, Nulledflix, and BlueLeaks, Plus DevSecOps Insights Jul 14 2020 4:00 pm UTC 21 mins
    Rick Holland
    Alex, Kacey, Charles and Rick host this week’s ShadowTalk to bring you the latest threat intelligence stories. This week they cover:
    - Torigon - What was Torigon and how did it fail to survive?
    - Nulledflix - The Nulled-focused streaming service taken down immediately for maintenance
    - BlueLeaks exposing private law enforcement files
    - DevSecOps and how it can be useful to your organization
  • Podcast: Torigon, Nulledflix, and BlueLeaks, Plus DevSecOps Insights Jul 14 2020 11:00 am UTC 21 mins
    Rick Holland
    Alex, Kacey, Charles and Rick host this week’s ShadowTalk to bring you the latest threat intelligence stories. This week they cover:
    - Torigon - What was Torigon and how did it fail to survive?
    - Nulledflix - The Nulled-focused streaming service taken down immediately for maintenance
    - BlueLeaks exposing private law enforcement files
    - DevSecOps and how it can be useful to your organization
  • Podcast: COVID-19 Third Party App Risks, Zoom, And DarkHotel Hackers Jul 10 2020 5:00 pm UTC 23 mins
    Kacey Clark, Alex Guirakhoo
    Coming to you from Dallas this week - we have Kacey, Harrison, Alex, and Charles. This week the team talks through third party app risks as they relate to COVID-19, as well as touch on security considerations for video conferencing platforms. We also talk through the latest story around the DarkHotel hackers using a VPN zero-day to compromise Chinese government agencies.
  • Podcast: COVID-19 Third Party App Risks, Zoom, And DarkHotel Hackers Jul 10 2020 12:00 pm UTC 23 mins
    Kacey Clark, Alex Guirakhoo
    Coming to you from Dallas this week - we have Kacey, Harrison, Alex, and Charles. This week the team talks through third party app risks as they relate to COVID-19, as well as touch on security considerations for video conferencing platforms. We also talk through the latest story around the DarkHotel hackers using a VPN zero-day to compromise Chinese government agencies.
  • Beware of Phishers: New Research into the Ecosystem of Phishing Recorded: Jul 8 2020 40 mins
    Alex Guirakhoo, Threat Researcher, Team Lead
    $1 for a cheap domain. $12.99 for 10 million email contacts. New findings from our Photon Research Team show that cybercriminals can launch phishing campaigns for under $20! In this webinar, Alex Guirakhoo and Harrison Van Riper walk through the Ecosystem of Phishing. The team will cover:

    - New phishing data findings
    - How cybercriminals are crafting and distributing phishing attacks
    - TTPs of phishers
    - Mitigation recommendations for you and your business
  • Podcast: Guest Tom Schmitt On His Origins in Cyber Threat Intel and TITO Recorded: Jul 2 2020 45 mins
    CISO Rick Holland and Host Alex Guirakhoo
    CISO Rick Holland and Host Alex Guirakhoo chat with this week's special guest Tom Schmitt, Global Director of Threat Intelligence at Anheuser-Busch InBev. They discuss Tom’s origin in the Cyber Threat Intelligence space and get his insight on TITO (or “Threat, Infrastructure, Targets, and Outcomes”), a platform and data-agnostic threat intelligence framework.
  • Podcast: GuestTom Schmitt Talks On His Origins in Cyber Threat Intel and TITO Recorded: Jul 2 2020 45 mins
    CISO Rick Holland and Host Alex Guirakhoo
    CISO Rick Holland and Host Alex Guirakhoo chat with this week's special guest Tom Schmitt, Global Director of Threat Intelligence at Anheuser-Busch InBev. They discuss Tom’s origin in the Cyber Threat Intelligence space and get his insight on TITO (or “Threat, Infrastructure, Targets, and Outcomes”), a platform and data-agnostic threat intelligence framework.
  • Threat Model of a Remote Worker Recorded: Jul 1 2020 56 mins
    Rick Holland, CISO and VP of Strategy
    Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 has forced many organizations to accelerate their plans or create them on the fly. Digital Shadows has produced a threat model for the remote worker, taking into account the various risks and threats that employees face while working offsite.

    CISO Rick Holland and Information Security Director Isidoros Monogioudis share their thoughts on the remote worker threat model in this webinar.

    You will learn:
    - How threat actors are targeting remote workers
    - 6 major cyber risks and threats to your remote employees
    - How to mitigate remote working risks to your employees
  • Threat Model of a Remote Worker Recorded: Jun 29 2020 56 mins
    Rick Holland, CISO and VP of Strategy
    Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 has forced many organizations to accelerate their plans or create them on the fly. Digital Shadows has produced a threat model for the remote worker, taking into account the various risks and threats that employees face while working offsite.

    CISO Rick Holland and Information Security Director Isidoros Monogioudis share their thoughts on the remote worker threat model in this webinar.

    You will learn:
    - How threat actors are targeting remote workers
    - 6 major cyber risks and threats to your remote employees
    - How to mitigate remote working risks to your employees
  • Beware of Phishers: New Research into the Ecosystem of Phishing Recorded: Jun 26 2020 40 mins
    Alex Guirakhoo, Threat Researcher, Team Lead
    $1 for a cheap domain. $12.99 for 10 million email contacts. New findings from our Photon Research Team show that cybercriminals can launch phishing campaigns for under $20! In this webinar, Alex Guirakhoo and Harrison Van Riper walk through the Ecosystem of Phishing. The team will cover:

    - New phishing data findings
    - How cybercriminals are crafting and distributing phishing attacks
    - TTPs of phishers
    - Mitigation recommendations for you and your business
  • Dark Web Digest: Gaining Valuable threat Intelligence from Cybercriminal Forums Recorded: Jun 18 2020 29 mins
    Alex Guirakhoo, Threat Researcher, Team Lead and Kacey Clark, Threat Researcher
    In our latest dark web findings, we have observed notable changes in criminal forum activity and trends. Dark web forums harbor a dynamic environment for criminals looking to buy or sell compromised data, zero-day exploits, and system accesses. During this session, we will cover the risk impact of dark web findings, explore the evolution of dark web forums, and trends observed across platforms.

    Attendees will take away:

    - Insights into current dark web trends
    - Tactics and techniques attackers use to collect or share your data
    - How to gain visibility into your organization's dark web risk
    - Strategies for fortifying your defenses and mitigating dark web risks
  • The Cybercriminal Forum is Not Dead Recorded: Jun 2 2020 45 mins
    Stewart Bertram
    With cybercriminals carrying out more transactions and discussions on alternative platforms, it would seem that forums would decrease. However, this does not seem to be materializing. In fact, forums appear to be flourishing against all odds.

    In this webinar, our team dives into our recent research around cybercriminal forums to understand why forums are flourishing in a world of alternative technologies.
  • Beware of Phishers: New Research into the Ecosystem of Phishing Recorded: May 28 2020 40 mins
    Alex Guirakhoo, Threat Researcher, Team Lead
    $1 for a cheap domain. $12.99 for 10 million email contacts. New findings from our Photon Research Team show that cybercriminals can launch phishing campaigns for under $20! In this webinar, Alex Guirakhoo and Harrison Van Riper walk through the Ecosystem of Phishing. The team will cover:

    - New phishing data findings
    - How cybercriminals are crafting and distributing phishing attacks
    - TTPs of phishers
    - Mitigation recommendations for you and your business
  • Threat Model of a Remote Worker Recorded: May 21 2020 56 mins
    Rick Holland, CISO and VP of Strategy
    Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 has forced many organizations to accelerate their plans or create them on the fly. Digital Shadows has produced a threat model for the remote worker, taking into account the various risks and threats that employees face while working offsite.

    CISO Rick Holland and Information Security Director Isidoros Monogioudis share their thoughts on the remote worker threat model in this webinar.

    You will learn:
    - How threat actors are targeting remote workers
    - 6 major cyber risks and threats to your remote employees
    - How to mitigate remote working risks to your employees
The Leader in Digital Risk Protection
Digital Shadows SearchLight protects organizations against external risk exposure. Organizations register their company names, brand names, domains, and document marketings for monitoring. Through the SearchLight portal, we provide the most relevant and critical digital risks with complete visibility, context, recommended actions, and ways to remediate the risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Cybercriminal Forum is Not Dead
  • Live at: Jun 2 2020 6:00 pm
  • Presented by: Stewart Bertram
  • From:
Your email has been sent.
or close