Hi [[ session.user.profile.firstName ]]

Beware of Phishers: New Research into the Ecosystem of Phishing

$1 for a cheap domain. $12.99 for 10 million email contacts. New findings from our Photon Research Team show that cybercriminals can launch phishing campaigns for under $20! In this webinar, Alex Guirakhoo and Harrison Van Riper walk through the Ecosystem of Phishing. The team will cover:

- New phishing data findings
- How cybercriminals are crafting and distributing phishing attacks
- TTPs of phishers
- Mitigation recommendations for you and your business
Recorded Jun 26 2020 40 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Alex Guirakhoo, Threat Researcher, Team Lead
Presentation preview: Beware of Phishers: New Research into the Ecosystem of Phishing

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cybersecurity People: The Good, The Bad and The Broken Recorded: Jul 30 2020 108 mins
    James Chappell, Becky Pinkard, Kacet Clark, Rick Holland, Rob Black and more
    RANT has teamed up with Digital Shadows to try answer a number of cybersecurity related questions while raising money for Barnardo’s. This is a chance to discuss big questions with big personalities, while hearing from genuinely interesting speakers.
  • Account Takeover: Data Findings, Popular Tools, and Prevalent Actors Recorded: Jul 30 2020 30 mins
    Alex Guirakhoo, Threat Researcher, Team Lead, Kacey Clark, Threat Researcher and Michael Marriott, Senior PMM
    Join the Photon team to learn about our latest research on account takeover. This combines data findings from Digital Shadows’ repository of 15 billion credentials and activity from the cybercriminal underground. Attendees will learn:
    - The size of the problem
    - The attacker toolkit for performing account takeovers
    - Current approaches to brute forcing
    - Most active actors
    - Best practices for preventing account takeovers
  • Cybersecurity People: The Good, The Bad and The Broken Recorded: Jul 30 2020 108 mins
    James Chappell, Becky Pinkard, Kacet Clark, Rick Holland, Rob Black and more
    RANT has teamed up with Digital Shadows to try answer a number of cybersecurity related questions while raising money for Barnardo’s. This is a chance to discuss big questions with big personalities, while hearing from genuinely interesting speakers.
  • Account Takeover: Data Findings, Popular Tools, and Prevalent Actors Recorded: Jul 30 2020 30 mins
    Alex Guirakhoo, Threat Researcher, Team Lead, Kacey Clark, Threat Researcher and Michael Marriott, Senior PMM
    Join the Photon team to learn about our latest research on account takeover. This combines data findings from Digital Shadows’ repository of 15 billion credentials and activity from the cybercriminal underground. Attendees will learn:
    - The size of the problem
    - The attacker toolkit for performing account takeovers
    - Current approaches to brute forcing
    - Most active actors
    - Best practices for preventing account takeovers
  • [Podcast] Twitter takeovers, Data Viper breached by NightLion, and CryptBB Recorded: Jul 29 2020 26 mins
    Threat Researchers, Alex, Kacey, and Alec
    This week’s ShadowTalk hosts Alex, Kacey, and Alec discuss the latest threat intelligence stories. In this epic episode they cover:

    - Top Twitter accounts that were accessed to promote a Bitcoin scam
    - Threat Intel platform Data Viper gets breached in revenge attack by threat actor NightLion
    - Updates on cybercriminal forum CryptBB - where are they now and what does the future hold?
  • [Podcast] Twitter takeovers, Data Viper breached by NightLion, and CryptBB Recorded: Jul 29 2020 26 mins
    Threat Researchers, Alex, Kacey, and Alec
    This week’s ShadowTalk hosts Alex, Kacey, and Alec discuss the latest threat intelligence stories. In this epic episode they cover:

    - Top Twitter accounts that were accessed to promote a Bitcoin scam
    - Threat Intel platform Data Viper gets breached in revenge attack by threat actor NightLion
    - Updates on cybercriminal forum CryptBB - where are they now and what does the future hold?
  • Podcast: PAN-OS Vulnerability, Lazarus Group, BEC scammer "HushPuppi" and ATO Recorded: Jul 28 2020 22 mins
    Viktoria Austin and Photon Team
    This week, Digital Shadows team Viktoria, Demelza, Adam and Stefano cover:

    - PAN-OS Vulnerability (CVE-2020-2021): Impact & Mitigation
    - Magecart Developments: Lazarus Group tied to Magecart
    - FBI arrests “Hushpuppi” for alleged BEC Cybercrime Scheme
    - Photon ATO Research: Overview + Key takeaways
  • Podcast: PAN-OS Vulnerability, Lazarus Group, BEC scammer "HushPuppi" and ATO Recorded: Jul 28 2020 22 mins
    Viktoria Austin and Photon Team
    This week, Digital Shadows team Viktoria, Demelza, Adam and Stefano cover:

    - PAN-OS Vulnerability (CVE-2020-2021): Impact & Mitigation
    - Magecart Developments: Lazarus Group tied to Magecart
    - FBI arrests “Hushpuppi” for alleged BEC Cybercrime Scheme
    - Photon ATO Research: Overview + Key takeaways
  • Podcast: Hacktivist Chooses Destruction Over Profit w/ Ransomware Recorded: Jul 21 2020 27 mins
    Viktoria Austin
    Pietro, Viktoria, Adam, and Demelza cover this week’s top threat intelligence stories, including a Hacktivist group choosing destruction over profit with ransomware.

    Other stories this week include
    - EasyJet breach
    - Collection 1 Hacker Identified
    - Fin7 Member Arrested
    - iOS Mail App Vulnerability
  • Podcast: Hacktivist Chooses Destruction Over Profit w/ Ransomware Recorded: Jul 21 2020 27 mins
    Viktoria Austin
    Pietro, Viktoria, Adam, and Demelza cover this week’s top threat intelligence stories, including a Hacktivist group choosing destruction over profit with ransomware.

    Other stories this week include
    - EasyJet breach
    - Collection 1 Hacker Identified
    - Fin7 Member Arrested
    - iOS Mail App Vulnerability
  • Webinar: Outside-In Intelligence for DevSecOps Recorded: Jul 16 2020 21 mins
    Michael Marriott, Senior Product Marketing Manager
    Today's development practices lead to increased exposure, and it's on the security team to protect the business. The recent Verizon Data Breach Incident Report 2020 states that errors are now more common than malware in data breach incidents. While misconfigurations accounted for 20% of all error varieties in 2018, this doubled to over 40% in 2019.

    Join Michael Marriott, PMM at Digital Shadows, to see how Digital Shadows provides outside-in intelligence for DevSecOps risks.

    Attendees of this webinar will learn how SearchLight helps:
    - Discover employees exposing code, with the new ‘Unauthorized Commit to a Public Code Repository’ alert
    - Gain intelligence on vulnerabilities
    - Detect file stores on open ports
    - Detect exposed passwords and access keys
  • Webinar: Outside-In Intelligence for DevSecOps Recorded: Jul 16 2020 21 mins
    Michael Marriott, Senior Product Marketing Manager
    Today's development practices lead to increased exposure, and it's on the security team to protect the business. The recent Verizon Data Breach Incident Report 2020 states that errors are now more common than malware in data breach incidents. While misconfigurations accounted for 20% of all error varieties in 2018, this doubled to over 40% in 2019.

    Join Michael Marriott, PMM at Digital Shadows, to see how Digital Shadows provides outside-in intelligence for DevSecOps risks.

    Attendees of this webinar will learn how SearchLight helps:
    - Discover employees exposing code, with the new ‘Unauthorized Commit to a Public Code Repository’ alert
    - Gain intelligence on vulnerabilities
    - Detect file stores on open ports
    - Detect exposed passwords and access keys
  • Podcast: Torigon, Nulledflix, and BlueLeaks, Plus DevSecOps Insights Recorded: Jul 14 2020 21 mins
    Rick Holland
    Alex, Kacey, Charles and Rick host this week’s ShadowTalk to bring you the latest threat intelligence stories. This week they cover:
    - Torigon - What was Torigon and how did it fail to survive?
    - Nulledflix - The Nulled-focused streaming service taken down immediately for maintenance
    - BlueLeaks exposing private law enforcement files
    - DevSecOps and how it can be useful to your organization
  • Podcast: Torigon, Nulledflix, and BlueLeaks, Plus DevSecOps Insights Recorded: Jul 14 2020 21 mins
    Rick Holland
    Alex, Kacey, Charles and Rick host this week’s ShadowTalk to bring you the latest threat intelligence stories. This week they cover:
    - Torigon - What was Torigon and how did it fail to survive?
    - Nulledflix - The Nulled-focused streaming service taken down immediately for maintenance
    - BlueLeaks exposing private law enforcement files
    - DevSecOps and how it can be useful to your organization
  • Podcast: COVID-19 Third Party App Risks, Zoom, And DarkHotel Hackers Recorded: Jul 10 2020 23 mins
    Kacey Clark, Alex Guirakhoo
    Coming to you from Dallas this week - we have Kacey, Harrison, Alex, and Charles. This week the team talks through third party app risks as they relate to COVID-19, as well as touch on security considerations for video conferencing platforms. We also talk through the latest story around the DarkHotel hackers using a VPN zero-day to compromise Chinese government agencies.
  • Podcast: COVID-19 Third Party App Risks, Zoom, And DarkHotel Hackers Recorded: Jul 10 2020 23 mins
    Kacey Clark, Alex Guirakhoo
    Coming to you from Dallas this week - we have Kacey, Harrison, Alex, and Charles. This week the team talks through third party app risks as they relate to COVID-19, as well as touch on security considerations for video conferencing platforms. We also talk through the latest story around the DarkHotel hackers using a VPN zero-day to compromise Chinese government agencies.
  • Beware of Phishers: New Research into the Ecosystem of Phishing Recorded: Jul 8 2020 40 mins
    Alex Guirakhoo, Threat Researcher, Team Lead
    $1 for a cheap domain. $12.99 for 10 million email contacts. New findings from our Photon Research Team show that cybercriminals can launch phishing campaigns for under $20! In this webinar, Alex Guirakhoo and Harrison Van Riper walk through the Ecosystem of Phishing. The team will cover:

    - New phishing data findings
    - How cybercriminals are crafting and distributing phishing attacks
    - TTPs of phishers
    - Mitigation recommendations for you and your business
  • Podcast: Guest Tom Schmitt On His Origins in Cyber Threat Intel and TITO Recorded: Jul 2 2020 45 mins
    CISO Rick Holland and Host Alex Guirakhoo
    CISO Rick Holland and Host Alex Guirakhoo chat with this week's special guest Tom Schmitt, Global Director of Threat Intelligence at Anheuser-Busch InBev. They discuss Tom’s origin in the Cyber Threat Intelligence space and get his insight on TITO (or “Threat, Infrastructure, Targets, and Outcomes”), a platform and data-agnostic threat intelligence framework.
  • Podcast: GuestTom Schmitt Talks On His Origins in Cyber Threat Intel and TITO Recorded: Jul 2 2020 45 mins
    CISO Rick Holland and Host Alex Guirakhoo
    CISO Rick Holland and Host Alex Guirakhoo chat with this week's special guest Tom Schmitt, Global Director of Threat Intelligence at Anheuser-Busch InBev. They discuss Tom’s origin in the Cyber Threat Intelligence space and get his insight on TITO (or “Threat, Infrastructure, Targets, and Outcomes”), a platform and data-agnostic threat intelligence framework.
  • Threat Model of a Remote Worker Recorded: Jul 1 2020 56 mins
    Rick Holland, CISO and VP of Strategy
    Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 has forced many organizations to accelerate their plans or create them on the fly. Digital Shadows has produced a threat model for the remote worker, taking into account the various risks and threats that employees face while working offsite.

    CISO Rick Holland and Information Security Director Isidoros Monogioudis share their thoughts on the remote worker threat model in this webinar.

    You will learn:
    - How threat actors are targeting remote workers
    - 6 major cyber risks and threats to your remote employees
    - How to mitigate remote working risks to your employees
The Leader in Digital Risk Protection
Digital Shadows SearchLight protects organizations against external risk exposure. Organizations register their company names, brand names, domains, and document marketings for monitoring. Through the SearchLight portal, we provide the most relevant and critical digital risks with complete visibility, context, recommended actions, and ways to remediate the risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Beware of Phishers: New Research into the Ecosystem of Phishing
  • Live at: Jun 26 2020 7:00 am
  • Presented by: Alex Guirakhoo, Threat Researcher, Team Lead
  • From:
Your email has been sent.
or close