Hi [[ session.user.profile.firstName ]]

Cybercrime finds a way, a look at this year's cybercrime trends

In this talk, Digital Shadows CISO, Rick Holland, will take you on a journey looking at 2020's top cybercrime hits. All your favorites will be included; "monkey see monkey do" ransomware, account takeover, and access keys on public-facing software repositories. Rick will also make fun of "derpweb" icebergs while mixing in some BBQ analogies.
Recorded Feb 2 2021 31 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rick Holland, CISO, Digital Shadows
Presentation preview: Cybercrime finds a way, a look at this year's cybercrime trends

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Webinar: Initial Access Brokers - A Deep Dive Mar 30 2021 4:00 pm UTC 41 mins
    Digital Shadows Threat Researchers Stefano De Blasi and Alec Alvarado
    The past 12 months have seen a significant increase in the number of ransomware variants, ransomware targets, and ransomware payments. This rise in ransomware has been helped by another pernicious trend: the risk of initial access brokers. A sharp increase in remote work, among other things, has helped initial access brokers (IAB) reach their full potential. Plus, their work is increasingly lucrative with access selling for an average of $7,100. In this webinar we cover:

    - How Initial Access Brokers give rise to ransomware
    - The different types of access most commonly sold
    - How the rise in remote work has caused additional challenges
    - The most common geographies targeted
    - How cybercriminals use this access and what that means for your
    business
  • Webinar: Initial Access Brokers - A Deep Dive Mar 30 2021 9:30 am UTC 41 mins
    Digital Shadows Threat Researchers Stefano De Blasi and Alec Alvarado
    The past 12 months have seen a significant increase in the number of ransomware variants, ransomware targets, and ransomware payments. This rise in ransomware has been helped by another pernicious trend: the risk of initial access brokers. A sharp increase in remote work, among other things, has helped initial access brokers (IAB) reach their full potential. Plus, their work is increasingly lucrative with access selling for an average of $7,100. In this webinar we cover:

    - How Initial Access Brokers give rise to ransomware
    - The different types of access most commonly sold
    - How the rise in remote work has caused additional challenges
    - The most common geographies targeted
    - How cybercriminals use this access and what that means for your
    business
  • Podcast: New Australian Legislature, VMware Bugs, and More! Mar 12 2021 5:00 pm UTC 46 mins
    Digital Shadows Threat Researchers Kim Bromley, Dylan Gray, Stefano De Blasi, and Adam Cook
    ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence. This week they cover:
    - The Australian Criminal Intelligence Commission (ACIC) issues three new
    warrants for dealing with cybercrime - how does this new legislation
    increase law enforcement powers?
    - VMware has revealed a critical-rated bug - what should security teams
    know?
    - Adam covers ICEDID Infection and ransomware
    - The team discuss the DPRK Indictment
  • Podcast: New Australian Legislature, VMware Bugs, and More! Mar 12 2021 10:30 am UTC 46 mins
    Digital Shadows Threat Researchers Kim Bromley, Dylan Gray, Stefano De Blasi, and Adam Cook
    ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence. This week they cover:
    - The Australian Criminal Intelligence Commission (ACIC) issues three new
    warrants for dealing with cybercrime - how does this new legislation
    increase law enforcement powers?
    - VMware has revealed a critical-rated bug - what should security teams
    know?
    - Adam covers ICEDID Infection and ransomware
    - The team discuss the DPRK Indictment
  • Podcast: When Initial Access Brokers Attack Recorded: Mar 5 2021 25 mins
    Digital Shadows CISO Rick Holland and Threat Researchers Alec Alvarado, Charles Ragland, and Ivan Righi
    ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
    - The team talks Initial Access Brokers (IAB) - what role do these middle-
    men play in the ransomware game?
    - How can your company mitigate risks against IABs?
    - The latest on the Accellion incident
    - Third party attacks - where does the blame fall?
  • Podcast: When Initial Access Brokers Attack Recorded: Mar 5 2021 25 mins
    Digital Shadows CISO Rick Holland and Threat Researchers Alec Alvarado, Charles Ragland, and Ivan Righi
    ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
    - The team talks Initial Access Brokers (IAB) - what role do these middle-
    men play in the ransomware game?
    - How can your company mitigate risks against IABs?
    - The latest on the Accellion incident
    - Third party attacks - where does the blame fall?
  • Supply Chain Compromise Overview Recorded: Mar 3 2021 24 mins
    Jamie Hart, Digital Shadows Cyber Threat Intelligence Analyst
    Supply chain cybersecurity risk warnings increased by 80% by Q2, 2020, and this trend is likely to continue. During this webinar, Jamie Hart will cover:
    - Overview of supply chain compromise and third party risks
    - Historical supply chain attacks
    - Common tactics, techniques an procedures
    - Mitigation options
  • Supply Chain Compromise Overview Recorded: Mar 3 2021 24 mins
    Jamie Hart, Digital Shadows Cyber Threat Intelligence Analyst
    Supply chain cybersecurity risk warnings increased by 80% by Q2, 2020, and this trend is likely to continue. During this webinar, Jamie Hart will cover:
    - Overview of supply chain compromise and third party risks
    - Historical supply chain attacks
    - Common tactics, techniques an procedures
    - Mitigation options
  • Podcast: Egregor Arrests, SIM-Swapping, and Oldsmar Updates! Recorded: Feb 26 2021 52 mins
    Threat Researchers Kim Bromley, Dylan Gray, Stefano De Blasi, and Adam Cook
    ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence. This week they cover:
    - Adam takes us through the latest on Egregor and related arrests - is the
    threat group down but not out?
    - Dylan talks SIM-swapping - who was targeted?
    - Kim brings us the most recent news on the Centreon breach
    - Plus, the team reviews the Oldsmar water treatment facility attack
  • Podcast: Egregor Arrests, SIM-Swapping, and Oldsmar Updates! Recorded: Feb 26 2021 52 mins
    Threat Researchers Kim Bromley, Dylan Gray, Stefano De Blasi, and Adam Cook
    ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence. This week they cover:
    - Adam takes us through the latest on Egregor and related arrests - is the
    threat group down but not out?
    - Dylan talks SIM-swapping - who was targeted?
    - Kim brings us the most recent news on the Centreon breach
    - Plus, the team reviews the Oldsmar water treatment facility attack
  • Webinar: SearchLight and AzureAD: Auto Validate Exposed Credentials Recorded: Feb 23 2021 24 mins
    Michael Marriott, Senior Product Marketing Manager, Digital Shadows
    Credential exposure is a high-priority issue, preventing attackers from accessing your systems or selling this access to the highest bidder in dark web criminal marketplaces.

    Yet, not all detected exposed credentials are useful to security teams. Analysts must assess if the credentials are authentic or made up, if they are active or inactive, if the email and password matches the corporate format policy, and if they have been previously actioned— all to say, does this exposed credentials pair pose a risk to our organization?

    Join us for a webinar to understand how this process is now automated in SearchLight by our Microsoft Azure AD integration, drastically reducing the time required to triage.
  • Webinar: SearchLight and AzureAD: Auto Validate Exposed Credentials Recorded: Feb 23 2021 24 mins
    Michael Marriott, Senior Product Marketing Manager, Digital Shadows
    Credential exposure is a high-priority issue, preventing attackers from accessing your systems or selling this access to the highest bidder in dark web criminal marketplaces.

    Yet, not all detected exposed credentials are useful to security teams. Analysts must assess if the credentials are authentic or made up, if they are active or inactive, if the email and password matches the corporate format policy, and if they have been previously actioned— all to say, does this exposed credentials pair pose a risk to our organization?

    Join us for a webinar to understand how this process is now automated in SearchLight by our Microsoft Azure AD integration, drastically reducing the time required to triage.
  • Podcast: CDPR Victimized, Ziggy’s End, and the Oldsmar Water Incident Recorded: Feb 19 2021 23 mins
    CISO Rick Holland and Threat Researchers Alec Alvarado, Austin Merritt, and Ivan Righi
    ShadowTalk hosts Alec, Ivan, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
    - Cyberpunk and Witcher fans beware - threat actors target the CD Projekt
    Red source code
    - Ziggy ransomware calls it quits - is law enforcement activity driving this
    impact?
    - Oldsmar, FL water treatment facility gets hacked - could other critical
    infrastructure be at risk?
    - Researcher impacts dozens of tech firms through a supply chain attack,
    winning a $130,000 ‘bug bounty’
  • Podcast: CDPR Victimized, Ziggy’s End, and the Oldsmar Water Incident Recorded: Feb 19 2021 23 mins
    CISO Rick Holland and Threat Researchers Alec Alvarado, Austin Merritt, and Ivan Righi
    ShadowTalk hosts Alec, Ivan, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
    - Cyberpunk and Witcher fans beware - threat actors target the CD Projekt
    Red source code
    - Ziggy ransomware calls it quits - is law enforcement activity driving this
    impact?
    - Oldsmar, FL water treatment facility gets hacked - could other critical
    infrastructure be at risk?
    - Researcher impacts dozens of tech firms through a supply chain attack,
    winning a $130,000 ‘bug bounty’
  • Podcast: Lebanese Cedar, Nefilim Ghost Credentials, SolarWinds, and Emotet Recorded: Feb 12 2021 41 mins
    Threat Researchers Kim Bromley, Stefano De Blasi, and Adam Cook
    ShadowTalk hosts Stefano, Adam, and Kim bring you the latest in threat intelligence. This week they cover:
    - More threat actors and attack vectors are being investigated in the
    SolarWinds compromise
    - Law enforcement officials in the Netherlands are delivering an Emotet
    update that will remove it from infected devices
    - Kim talks Lebanese Cedar - What’s new in their latest attack?
    - Adam reviews Nefilim ransomware - how were they able to gain access
    and why it reinforces the need for securing employee accounts
    - Plus, don’t miss the malware name of the week!
  • Podcast: Lebanese Cedar, Nefilim Ghost Credentials, SolarWinds, and Emotet Recorded: Feb 12 2021 41 mins
    Threat Researchers Kim Bromley, Stefano De Blasi, and Adam Cook
    ShadowTalk hosts Stefano, Adam, and Kim bring you the latest in threat intelligence. This week they cover:
    - More threat actors and attack vectors are being investigated in the
    SolarWinds compromise
    - Law enforcement officials in the Netherlands are delivering an Emotet
    update that will remove it from infected devices
    - Kim talks Lebanese Cedar - What’s new in their latest attack?
    - Adam reviews Nefilim ransomware - how were they able to gain access
    and why it reinforces the need for securing employee accounts
    - Plus, don’t miss the malware name of the week!
  • Ransomware: It's Still a Big Deal Recorded: Feb 9 2021 26 mins
    Austin Merritt, Cyber Threat Intelligence Analyst
    In this webinar, we dive into ransomware and extortion. We take a look at:
    - Trends from 2020
    - What to expect in 2021
    - Why is Ransomware a big deal?
    - Copycat Crimes
    - Initial access and business intelligence gathering
    - APT's
  • Ransomware: It's Still a Big Deal Recorded: Feb 9 2021 26 mins
    Austin Merritt, Cyber Threat Intelligence Analyst
    In this webinar, we dive into ransomware and extortion. We take a look at:
    - Trends from 2020
    - What to expect in 2021
    - Why is Ransomware a big deal?
    - Copycat Crimes
    - Initial access and business intelligence gathering
    - APT's
  • Podcast: Law Enforcement Wins the Week - The Fall of NetWalker and Emotet Recorded: Feb 5 2021 27 mins
    Digital Shadows CISO, Rick Holland and Threat Researchers, Alec Alvarado, Austin Merritt and Charles Ragland
    ShadowTalk hosts Alec, Charles, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
    - Mimecast confirms SolarWinds attackers breached security certificate -
    the latest updates
    - The rise and fall of Emotet plus unique video footage of the takedown
    - NetWalker ransomware targeted and taken down by US and Bulgarian
    Law Enforcement
    - Avaddon adopts a new tactic - could it become the MO of other threat
    groups?
    - North Korean threat actors go phishing for security researchers with fake
    social media profiles
  • Podcast: Law Enforcement Wins the Week - The Fall of NetWalker and Emotet Recorded: Feb 5 2021 27 mins
    Digital Shadows CISO, Rick Holland and Threat Researchers, Alec Alvarado, Austin Merritt and Charles Ragland
    ShadowTalk hosts Alec, Charles, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
    - Mimecast confirms SolarWinds attackers breached security certificate -
    the latest updates
    - The rise and fall of Emotet plus unique video footage of the takedown
    - NetWalker ransomware targeted and taken down by US and Bulgarian
    Law Enforcement
    - Avaddon adopts a new tactic - could it become the MO of other threat
    groups?
    - North Korean threat actors go phishing for security researchers with fake
    social media profiles
The Leader in Digital Risk Protection
Digital Shadows SearchLight protects organizations against external risk exposure. Organizations register their company names, brand names, domains, and document marketings for monitoring. Through the SearchLight portal, we provide the most relevant and critical digital risks with complete visibility, context, recommended actions, and ways to remediate the risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cybercrime finds a way, a look at this year's cybercrime trends
  • Live at: Feb 2 2021 9:30 am
  • Presented by: Rick Holland, CISO, Digital Shadows
  • From:
Your email has been sent.
or close