Deep Dive into the 2020 Cyber Threat Intelligence Estimate
Join us for a panel discussion on the key findings from the 2020 Cyber Threat Intelligence Estimate. Todd Weber (CTO of Optiv) Jen Miller Osborn (Deputy Director of Threat Intelligence at Unit 42, Palo Alto Networks), and Rick Holland (CISO at Digital Shadows) discuss a range of topics outlined in the report.
Attendees will learn about:
- Ransomware trends, groups, and tactics
- The malicious use of PowerShell and what defenders can do about it
- The continuing popularity of account takeover
- The real impact of COVID-19. Were the initial fears realized?
- Looking ahead and planning for 2021
RecordedJan 13 202132 mins
Your place is confirmed, we'll send you email reminders
Jamie Hart, Digital Shadows Cyber Threat Intelligence Analyst
Supply chain cybersecurity risk warnings increased by 80% by Q2, 2020, and this trend is likely to continue. During this webinar, Jamie Hart will cover:
- Overview of supply chain compromise and third party risks
- Historical supply chain attacks
- Common tactics, techniques an procedures
- Mitigation options
Jamie Hart, Digital Shadows Cyber Threat Intelligence Analyst
Supply chain cybersecurity risk warnings increased by 80% by Q2, 2020, and this trend is likely to continue. During this webinar, Jamie Hart will cover:
- Overview of supply chain compromise and third party risks
- Historical supply chain attacks
- Common tactics, techniques an procedures
- Mitigation options
In this webinar, we dive into ransomware and extortion. We take a look at:
- Trends from 2020
- What to expect in 2021
- Why is Ransomware a big deal?
- Copycat Crimes
- Initial access and business intelligence gathering
- APT's
In this webinar, we dive into ransomware and extortion. We take a look at:
- Trends from 2020
- What to expect in 2021
- Why is Ransomware a big deal?
- Copycat Crimes
- Initial access and business intelligence gathering
- APT's
In this talk, Digital Shadows CISO, Rick Holland, will take you on a journey looking at 2020's top cybercrime hits. All your favorites will be included; "monkey see monkey do" ransomware, account takeover, and access keys on public-facing software repositories. Rick will also make fun of "derpweb" icebergs while mixing in some BBQ analogies.
In this talk, Digital Shadows CISO, Rick Holland, will take you on a journey looking at 2020's top cybercrime hits. All your favorites will be included; "monkey see monkey do" ransomware, account takeover, and access keys on public-facing software repositories. Rick will also make fun of "derpweb" icebergs while mixing in some BBQ analogies.
Digital Shadows Threat Researchers, Kim Bromley, Stefano De Blasi, and Adam Cook
ShadowTalk hosts Stefano, Kim, and Adam bring you the latest in threat intelligence. This week they cover:
- FireEye, a top security firm, suffers a breach just weeks after
announcing a huge investment by Blackstone
- Phishing campaigns target the distribution of the Covid-19 vaccine
- Ransomware gangs resort to cold-calling victims in order to cash in
- Plus, the very festive ‘Malware name of the week’
Digital Shadows Threat Researchers, Kim Bromley, Stefano De Blasi, and Adam Cook
ShadowTalk hosts Stefano, Kim, and Adam bring you the latest in threat intelligence. This week they cover:
- FireEye, a top security firm, suffers a breach just weeks after
announcing a huge investment by Blackstone
- Phishing campaigns target the distribution of the Covid-19 vaccine
- Ransomware gangs resort to cold-calling victims in order to cash in
- Plus, the very festive ‘Malware name of the week’
Stefano De Blasi, Threat Researcher, Digital Shadows
Join the Photon team to learn about our latest research on account takeover. This combines data findings from Digital Shadows’ repository of 15 billion credentials and activity from the cybercriminal underground.
- The size of the problem
- The attacker toolkit for performing account takeovers
- Current approaches to brute forcing
- Most active actors
- Best practices for preventing account takeovers
Join the Photon team to learn about our latest research on account takeover. This combines data findings from Digital Shadows’ repository of 15 billion credentials and activity from the cybercriminal underground.
- The size of the problem
- The attacker toolkit for performing account takeovers
- Current approaches to brute forcing
- Most active actors
- Best practices for preventing account takeovers
CISO, Rick Holland and Threat Researchers, Kacey, Charles and Alec
ShadowTalk hosts Kacey, Charles, Alec, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
- REvil ransomware breathes new life into Gootkit malware
- C-level email credentials listed for sale on a cybercriminal marketplace
- Does REvil have ties to Maze and Egregor? A conversation about
source evaluation and attribution.
- Spam Haus reports that thousands of IPV4 addresses are suddenly
coming alive - is more BGP abuse on the horizon?
Digital Shadows Threat Researchers, Alec Alvarado Charles Ragland, Austin Merritt and Ivan Righi
ShadowTalk hosts Alec, Charles, Austin, and Ivan bring you the latest in threat intelligence. This week they cover:
- Significant updates to the SolarWinds incident
- Overlaps of the "Sunburst" backdoor and malware known to be used
by the believed Russia-affiliated APT "Turla"
- Possible SolarWinds scam - SolarLeaks claiming to sell data stolen in SolarWinds attacks
- The newly identified Sunspot malware
- Mimecast reporting of a compromised certificate possibly related to SolarWinds - the team dives deeper
- DarkSide ransomware decryptor keys being released and how DarkSide responded
CISO, Rick Holland and Threat Researchers, Kacey, Charles and Alec
ShadowTalk hosts Kacey, Charles, Alec, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
- REvil ransomware breathes new life into Gootkit malware
- C-level email credentials listed for sale on a cybercriminal marketplace
- Does REvil have ties to Maze and Egregor? A conversation about
source evaluation and attribution.
- Spam Haus reports that thousands of IPV4 addresses are suddenly
coming alive - is more BGP abuse on the horizon?
Digital Shadows Threat Researchers, Alec Alvarado Charles Ragland, Austin Merritt and Ivan Righi
ShadowTalk hosts Alec, Charles, Austin, and Ivan bring you the latest in threat intelligence. This week they cover:
- Significant updates to the SolarWinds incident
- Overlaps of the "Sunburst" backdoor and malware known to be used
by the believed Russia-affiliated APT "Turla"
- Possible SolarWinds scam - SolarLeaks claiming to sell data stolen in SolarWinds attacks
- The newly identified Sunspot malware
- Mimecast reporting of a compromised certificate possibly related to SolarWinds - the team dives deeper
- DarkSide ransomware decryptor keys being released and how DarkSide responded
Matthew Quinn, Senior Sales Engineer, Digital Shadows
Research has shown that prominent threat actors, including the well documented ShinyHunters and GnosticPlayers, are targeting organizations globally by identifying exposed infrastructure access keys such as AWS and Oracle on sources such as GitHub to gain access to customer data, as well as identifying and download exposed customer data from exposed storage such as Amazon S3 Buckets, RSYNC and SMB servers.
This presentation by Digital Shadows details how these problems arise in the first place, how to detect them, and how to mitigate against from them occurring again in the future.
Matthew Quinn, Senior Sales Engineer, Digital Shadows
Research has shown that prominent threat actors, including the well documented ShinyHunters and GnosticPlayers, are targeting organizations globally by identifying exposed infrastructure access keys such as AWS and Oracle on sources such as GitHub to gain access to customer data, as well as identifying and download exposed customer data from exposed storage such as Amazon S3 Buckets, RSYNC and SMB servers.
This presentation by Digital Shadows details how these problems arise in the first place, how to detect them, and how to mitigate against from them occurring again in the future.
Digital Shadows Threat Researchers, Kim Bromley, Stefano De Blasi, Adam Cook and Dylan Gray
ShadowTalk hosts Stefano, Kim, Adam, and Dylan bring you the latest in threat intelligence. This week they cover:
- Post-holiday updates on SolarWinds - what have we missed?
- Ticketmaster gets fined $10 million for illegally accessing the internal
systems of a competitor, using the credentials of a former employee
- Apex Laboratory announced that it was the victim of a cyber attack -
what we know so far
- 2020 in review: What will the new year bring in the world of cyber
security?
Digital Shadows Threat Researchers, Kim Bromley, Stefano De Blasi, Adam Cook and Dylan Gray
ShadowTalk hosts Stefano, Kim, Adam, and Dylan bring you the latest in threat intelligence. This week they cover:
- Post-holiday updates on SolarWinds - what have we missed?
- Ticketmaster gets fined $10 million for illegally accessing the internal
systems of a competitor, using the credentials of a former employee
- Apex Laboratory announced that it was the victim of a cyber attack -
what we know so far
- 2020 in review: What will the new year bring in the world of cyber
security?
Todd Weber (CTO, Optiv) Jen Miller Osborn (Deputy Director of Threat Intelligence, Palo Alto Networks), Rick Holland (CISO)
Join us for a panel discussion on the key findings from the 2020 Cyber Threat Intelligence Estimate. Todd Weber (CTO of Optiv) Jen Miller Osborn (Deputy Director of Threat Intelligence at Unit 42, Palo Alto Networks), and Rick Holland (CISO at Digital Shadows) discuss a range of topics outlined in the report.
Attendees will learn about:
- Ransomware trends, groups, and tactics
- The malicious use of PowerShell and what defenders can do about it
- The continuing popularity of account takeover
- The real impact of COVID-19. Were the initial fears realized?
- Looking ahead and planning for 2021
Todd Weber (CTO, Optiv) Jen Miller Osborn (Deputy Director of Threat Intelligence, Palo Alto Networks), Rick Holland (CISO)
Join us for a panel discussion on the key findings from the 2020 Cyber Threat Intelligence Estimate. Todd Weber (CTO of Optiv) Jen Miller Osborn (Deputy Director of Threat Intelligence at Unit 42, Palo Alto Networks), and Rick Holland (CISO at Digital Shadows) discuss a range of topics outlined in the report.
Attendees will learn about:
- Ransomware trends, groups, and tactics
- The malicious use of PowerShell and what defenders can do about it
- The continuing popularity of account takeover
- The real impact of COVID-19. Were the initial fears realized?
- Looking ahead and planning for 2021
Digital Shadows SearchLight protects organizations against external risk exposure. Organizations register their company names, brand names, domains, and document marketings for monitoring. Through the SearchLight portal, we provide the most relevant and critical digital risks with complete visibility, context, recommended actions, and ways to remediate the risk.
Deep Dive into the 2020 Cyber Threat Intelligence EstimateTodd Weber (CTO, Optiv) Jen Miller Osborn (Deputy Director of Threat Intelligence, Palo Alto Networks), Rick Holland (CISO)[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]32 mins