The past 12 months have seen a significant increase in the number of ransomware variants, ransomware targets, and ransomware payments. This rise in ransomware has been helped by another pernicious trend: the risk of initial access brokers. A sharp increase in remote work, among other things, has helped initial access brokers (IAB) reach their full potential. Plus, their work is increasingly lucrative with access selling for an average of $7,100.
We're taking a closer look at IAB activity and how you can mitigate risks associated with these threat actors. In this webinar we cover:
- How Initial Access Brokers give rise to ransomware
- The different types of access most commonly sold
- How the rise in remote work has caused additional challenges
- The most common geographies targeted
- How cybercriminals use this access and what that means for your
business
RecordedMar 30 202141 mins
Your place is confirmed, we'll send you email reminders
Digital Shadows' CISO Rick Holland and HCL's Global Head Cybersecurity Product Management Syam Thommandru
Enterprises are leaping today to leverage newer digital services and platforms This Increases the avenues of enterprise’s critical information & key assets getting exposed in the open with they being unaware of it. This exposure presents more opportunities to adversaries for manipulating an enterprise’s digital presence causing Financial /reputation loss. These Digital Risks need to be managed and mitigated swiftly and effectively.
But what if your organization can address their Digital risks and receive Targeted Threat Intelligence without straining their internal teams?
HCL Digital Threat Intelligence powered by Digital Shadows can alleviate their workload, allowing the teams to be more strategic and efficient, providing more time to focus on core Business outcomes.
In this webinar we cover:
- Emerging Digital Risks for European Organizations
- Combating Emerging Digital Risks leveraging Free Tools to Get Started
- Learn how HCL increases visibility and provides actionable insights into Digital risks with its Digital Threat Intelligence Offering
Digital Shadows' CISO Rick Holland and HCL's Global Head Cybersecurity Product Management Syam Thommandru
Enterprises are leaping today to leverage newer digital services and platforms This Increases the avenues of enterprise’s critical information & key assets getting exposed in the open with they being unaware of it. This exposure presents more opportunities to adversaries for manipulating an enterprise’s digital presence causing Financial /reputation loss. These Digital Risks need to be managed and mitigated swiftly and effectively.
But what if your organization can address their Digital risks and receive Targeted Threat Intelligence without straining their internal teams?
HCL Digital Threat Intelligence powered by Digital Shadows can alleviate their workload, allowing the teams to be more strategic and efficient, providing more time to focus on core Business outcomes.
In this webinar we cover:
- Emerging Digital Risks for European Organizations
- Combating Emerging Digital Risks leveraging Free Tools to Get Started
- Learn how HCL increases visibility and provides actionable insights into Digital risks with its Digital Threat Intelligence Offering
Digital Shadows Senior Cyber Threat Intelligence Analyst, Chris Morgan
Initial access brokers have been steadily on the rise in recent years but the pandemic and a massive increase in remote-work created a perfect storm for increased threat actor activity, especially among initial access brokers.
With accesses selling for thousands of dollars, companies can't afford to fall victim to IAB's. So who is the most at risk when it comes to this specific brand of threat actors? In this speaking session we cover:
- The most common types of access sold
- Industries and geographies popular among IAB's
- How to mitigate risks to your company
Digital Shadows Senior Cyber Threat Intelligence Analyst, Chris Morgan
Initial access brokers have been steadily on the rise in recent years but the pandemic and a massive increase in remote-work created a perfect storm for increased threat actor activity, especially among initial access brokers.
With accesses selling for thousands of dollars, companies can't afford to fall victim to IAB's. So who is the most at risk when it comes to this specific brand of threat actors? In this speaking session we cover:
- The most common types of access sold
- Industries and geographies popular among IAB's
- How to mitigate risks to your company
Threat Researchers Alec Alvarado, Charles Ragland, Ivan Righi, and Digital Shadows CISO, Rick Holland
ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
- Ivan talks through the latest updates on the Facebook data breach - threat actors selling old data for cheap and what was potentially exposed
- Charles discusses Fortinet vulnerabilities - what are the technical details and how do defenders protect their data?
- The team dives deeper into the ransomware cartel
- Clop updates - what’s the latest and who are they targeting?
Threat Researchers Alec Alvarado, Charles Ragland, Ivan Righi, and Digital Shadows CISO, Rick Holland
ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
- Ivan talks through the latest updates on the Facebook data breach - threat actors selling old data for cheap and what was potentially exposed
- Charles discusses Fortinet vulnerabilities - what are the technical details and how do defenders protect their data?
- The team dives deeper into the ransomware cartel
- Clop updates - what’s the latest and who are they targeting?
Digital Shadows CISO, Rick Holland and ON2IT Senior VP, Cybersecurity Strategy, John Kindervag
Digital Shadows CISO Rick hosts this edition of ShadowTalk. He’s joined by special guest John Kindervag, creator of Zero Trust and Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow at ON2IT Cybersecurity. They discuss:
-John’s origin story and influences - what led to the creation of Zero Trust?
-Zero Trust - origin, design principles, and terminology
-What are your protect surfaces? - using Zero Trust
-John’s new position at ON2IT
Digital Shadows CISO, Rick Holland and ON2IT Senior VP, Cybersecurity Strategy, John Kindervag
Digital Shadows CISO Rick hosts this edition of ShadowTalk. He’s joined by special guest John Kindervag, creator of Zero Trust and Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow at ON2IT Cybersecurity. They discuss:
-John’s origin story and influences - what led to the creation of Zero Trust?
-Zero Trust - origin, design principles, and terminology
-What are your protect surfaces? - using Zero Trust
-John’s new position at ON2IT
Digital Shadows Threat Researchers, Kim Bromley, Chris Morgan, Stefano De Blasi, and Dylan Gray
ShadowTalk hosts Stefano, Dylan, Kim, and Chris bring you the latest in threat intelligence. This week they cover:
-Kim and her recent ransomware round-up - insurance company CNA suffers attack, Clop holds victims for ransom, and more
-Chris takes the team through the PHP Git Server backdoor
-Dylan and the group talk pandemic, remote-working, and cyber hygiene
Digital Shadows Threat Researchers, Kim Bromley, Chris Morgan, Stefano De Blasi, and Dylan Gray
ShadowTalk hosts Stefano, Dylan, Kim, and Chris bring you the latest in threat intelligence. This week they cover:
-Kim and her recent ransomware round-up - insurance company CNA suffers attack, Clop holds victims for ransom, and more
-Chris takes the team through the PHP Git Server backdoor
-Dylan and the group talk pandemic, remote-working, and cyber hygiene
Digital Shadows Senior Sales Engineer Matthew Quinn and Director of Professional Services Nadim Khater
The dark web is a mysterious unknown for many organizations. Unfortunately, gaining visibility into these locations is extremely challenging. Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.
In this webinar, attendees will learn about:
- How to mitigate risks from the dark web and best practices for data loss
prevention
- The blueprint of the dark web and the corresponding threats
- How to gain visibility into dark web threats for proactive threat mitigation
- Fortifying defenses for maximum data protection and how to work with
law enforcement to proactively manage threats.
- How Digital Shadows can help protect your organization
Digital Shadows Senior Sales Engineer Matthew Quinn and Director of Professional Services Nadim Khater
The dark web is a mysterious unknown for many organizations. Unfortunately, gaining visibility into these locations is extremely challenging. Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.
In this webinar, attendees will learn about:
- How to mitigate risks from the dark web and best practices for data loss
prevention
- The blueprint of the dark web and the corresponding threats
- How to gain visibility into dark web threats for proactive threat mitigation
- Fortifying defenses for maximum data protection and how to work with
law enforcement to proactively manage threats.
- How Digital Shadows can help protect your organization
Threat Researchers Alec Alvarado, Charles Ragland, Austin Merritt, and Digital Shadows CISO, Rick Holland
ShadowTalk hosts Alec, Austin, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
-The team discusses the latest on Exchange Servers vulnerabilities - should guards still be up?
-Austin takes us through the timeline of ransomware taking advantage of vulnerabilities regarding Microsoft
-Austin talks $50 million ransom against Acer - biggest known ransom request in modern history. What does this mean for the threat landscape going forward?
-A phishing campaign has stolen 400,000 OWA/O365 creds - how to make yourself the hardest target possible
Threat Researchers Alec Alvarado, Charles Ragland, Austin Merritt, and Digital Shadows CISO, Rick Holland
ShadowTalk hosts Alec, Austin, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
-The team discusses the latest on Exchange Servers vulnerabilities - should guards still be up?
-Austin takes us through the timeline of ransomware taking advantage of vulnerabilities regarding Microsoft
-Austin talks $50 million ransom against Acer - biggest known ransom request in modern history. What does this mean for the threat landscape going forward?
-A phishing campaign has stolen 400,000 OWA/O365 creds - how to make yourself the hardest target possible
Digital Shadows Threat Researchers Stefano De Blasi and Alec Alvarado
The past 12 months have seen a significant increase in the number of ransomware variants, ransomware targets, and ransomware payments. This rise in ransomware has been helped by another pernicious trend: the risk of initial access brokers. A sharp increase in remote work, among other things, has helped initial access brokers (IAB) reach their full potential. Plus, their work is increasingly lucrative with access selling for an average of $7,100.
We're taking a closer look at IAB activity and how you can mitigate risks associated with these threat actors. In this webinar we cover:
- How Initial Access Brokers give rise to ransomware
- The different types of access most commonly sold
- How the rise in remote work has caused additional challenges
- The most common geographies targeted
- How cybercriminals use this access and what that means for your
business
Digital Shadows Threat Researchers Stefano De Blasi and Alec Alvarado
The past 12 months have seen a significant increase in the number of ransomware variants, ransomware targets, and ransomware payments. This rise in ransomware has been helped by another pernicious trend: the risk of initial access brokers. A sharp increase in remote work, among other things, has helped initial access brokers (IAB) reach their full potential. Plus, their work is increasingly lucrative with access selling for an average of $7,100.
We're taking a closer look at IAB activity and how you can mitigate risks associated with these threat actors. In this webinar we cover:
- How Initial Access Brokers give rise to ransomware
- The different types of access most commonly sold
- How the rise in remote work has caused additional challenges
- The most common geographies targeted
- How cybercriminals use this access and what that means for your
business
Digital Shadows Threat Researchers, Kim Bromley, Chris Morgan, Stefano De Blasi, and Adam Cook
ShadowTalk hosts Stefano, Adam, Kim, and first-timer Chris bring you the latest in threat intelligence. This week they cover:
-Kim takes us through the return of FIN8 - what are the updates to the “BadHatch” backdoor
-Chris discusses DarkSide's recent resurgence after a quiet period - what’s the latest?
-Microsoft Exchange exploit update - the team discuss
-How are threat actors and cybercriminals using ProxyLogon vulnerabilities?
Digital Shadows Threat Researchers, Kim Bromley, Chris Morgan, Stefano De Blasi, and Adam Cook
ShadowTalk hosts Stefano, Adam, Kim, and first-timer Chris bring you the latest in threat intelligence. This week they cover:
-Kim takes us through the return of FIN8 - what are the updates to the “BadHatch” backdoor
-Chris discusses DarkSide's recent resurgence after a quiet period - what’s the latest?
-Microsoft Exchange exploit update - the team discuss
-How are threat actors and cybercriminals using ProxyLogon vulnerabilities?
Threat Researchers Alec Alvarado, Charles Ragland, Austin Merritt, and Ivan Righi
ShadowTalk hosts Alec, Ivan, Charles, and Austin bring you the latest in threat intelligence. This week they cover:
- The team discuss HAFNIUM and Microsoft Servers Exchange
- Updates on the Accellion incident - what’s the latest regarding Flagstar?
- The Verkada compromise - who were the victims affected by the breach of private video footage?
Threat Researchers Alec Alvarado, Charles Ragland, Austin Merritt, and Ivan Righi
ShadowTalk hosts Alec, Ivan, Charles, and Austin bring you the latest in threat intelligence. This week they cover:
- The team discuss HAFNIUM and Microsoft Servers Exchange
- Updates on the Accellion incident - what’s the latest regarding Flagstar?
- The Verkada compromise - who were the victims affected by the breach of private video footage?
Digital Shadows SearchLight protects organizations against external risk exposure. Organizations register their company names, brand names, domains, and document marketings for monitoring. Through the SearchLight portal, we provide the most relevant and critical digital risks with complete visibility, context, recommended actions, and ways to remediate the risk.
Initial Access Brokers - A Deep DiveDigital Shadows Threat Researchers Stefano De Blasi and Alec Alvarado[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]41 mins