Hi [[ session.user.profile.firstName ]]

Initial Access Brokers - A Deep Dive

The past 12 months have seen a significant increase in the number of ransomware variants, ransomware targets, and ransomware payments. This rise in ransomware has been helped by another pernicious trend: the risk of initial access brokers. A sharp increase in remote work, among other things, has helped initial access brokers (IAB) reach their full potential. Plus, their work is increasingly lucrative with access selling for an average of $7,100.

We're taking a closer look at IAB activity and how you can mitigate risks associated with these threat actors. In this webinar we cover:

- How Initial Access Brokers give rise to ransomware
- The different types of access most commonly sold
- How the rise in remote work has caused additional challenges
- The most common geographies targeted
- How cybercriminals use this access and what that means for your
business
Recorded Mar 30 2021 41 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Digital Shadows Threat Researchers Stefano De Blasi and Alec Alvarado
Presentation preview: Initial Access Brokers - A Deep Dive

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Combating Digital Risks - An Insider's Guide May 4 2021 4:00 pm UTC 59 mins
    Digital Shadows' CISO Rick Holland and HCL's Global Head Cybersecurity Product Management Syam Thommandru
    Enterprises are leaping today to leverage newer digital services and platforms This Increases the avenues of enterprise’s critical information & key assets getting exposed in the open with they being unaware of it. This exposure presents more opportunities to adversaries for manipulating an enterprise’s digital presence causing Financial /reputation loss. These Digital Risks need to be managed and mitigated swiftly and effectively.

    But what if your organization can address their Digital risks and receive Targeted Threat Intelligence without straining their internal teams?
    HCL Digital Threat Intelligence powered by Digital Shadows can alleviate their workload, allowing the teams to be more strategic and efficient, providing more time to focus on core Business outcomes.

    In this webinar we cover:

    - Emerging Digital Risks for European Organizations
    - Combating Emerging Digital Risks leveraging Free Tools to Get Started
    - Learn how HCL increases visibility and provides actionable insights into Digital risks with its Digital Threat Intelligence Offering
  • Combating Digital Risks - An Insider's Guide May 4 2021 9:30 am UTC 59 mins
    Digital Shadows' CISO Rick Holland and HCL's Global Head Cybersecurity Product Management Syam Thommandru
    Enterprises are leaping today to leverage newer digital services and platforms This Increases the avenues of enterprise’s critical information & key assets getting exposed in the open with they being unaware of it. This exposure presents more opportunities to adversaries for manipulating an enterprise’s digital presence causing Financial /reputation loss. These Digital Risks need to be managed and mitigated swiftly and effectively.

    But what if your organization can address their Digital risks and receive Targeted Threat Intelligence without straining their internal teams?
    HCL Digital Threat Intelligence powered by Digital Shadows can alleviate their workload, allowing the teams to be more strategic and efficient, providing more time to focus on core Business outcomes.

    In this webinar we cover:

    - Emerging Digital Risks for European Organizations
    - Combating Emerging Digital Risks leveraging Free Tools to Get Started
    - Learn how HCL increases visibility and provides actionable insights into Digital risks with its Digital Threat Intelligence Offering
  • The Rise of Initial Access Brokers Apr 20 2021 4:00 pm UTC 18 mins
    Digital Shadows Senior Cyber Threat Intelligence Analyst, Chris Morgan
    Initial access brokers have been steadily on the rise in recent years but the pandemic and a massive increase in remote-work created a perfect storm for increased threat actor activity, especially among initial access brokers.

    With accesses selling for thousands of dollars, companies can't afford to fall victim to IAB's. So who is the most at risk when it comes to this specific brand of threat actors? In this speaking session we cover:

    - The most common types of access sold
    - Industries and geographies popular among IAB's
    - How to mitigate risks to your company
  • The Rise of Initial Access Brokers Apr 20 2021 9:30 am UTC 18 mins
    Digital Shadows Senior Cyber Threat Intelligence Analyst, Chris Morgan
    Initial access brokers have been steadily on the rise in recent years but the pandemic and a massive increase in remote-work created a perfect storm for increased threat actor activity, especially among initial access brokers.

    With accesses selling for thousands of dollars, companies can't afford to fall victim to IAB's. So who is the most at risk when it comes to this specific brand of threat actors? In this speaking session we cover:

    - The most common types of access sold
    - Industries and geographies popular among IAB's
    - How to mitigate risks to your company
  • Podcast: Facebook Data Breach, Ransomware Cartel, and More! Apr 16 2021 4:00 pm UTC 37 mins
    Threat Researchers Alec Alvarado, Charles Ragland, Ivan Righi, and Digital Shadows CISO, Rick Holland
    ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
    - Ivan talks through the latest updates on the Facebook data breach - threat actors selling old data for cheap and what was potentially exposed
    - Charles discusses Fortinet vulnerabilities - what are the technical details and how do defenders protect their data?
    - The team dives deeper into the ransomware cartel
    - Clop updates - what’s the latest and who are they targeting?
  • Podcast: Facebook Data Breach, Ransomware Cartel, and More! Apr 16 2021 9:30 am UTC 37 mins
    Threat Researchers Alec Alvarado, Charles Ragland, Ivan Righi, and Digital Shadows CISO, Rick Holland
    ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
    - Ivan talks through the latest updates on the Facebook data breach - threat actors selling old data for cheap and what was potentially exposed
    - Charles discusses Fortinet vulnerabilities - what are the technical details and how do defenders protect their data?
    - The team dives deeper into the ransomware cartel
    - Clop updates - what’s the latest and who are they targeting?
  • Creator of Zero Trust John Kindervag Talks Origins and the Future of Zero Trust! Apr 13 2021 4:00 pm UTC 39 mins
    Digital Shadows CISO, Rick Holland and ON2IT Senior VP, Cybersecurity Strategy, John Kindervag
    Digital Shadows CISO Rick hosts this edition of ShadowTalk. He’s joined by special guest John Kindervag, creator of Zero Trust and Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow at ON2IT Cybersecurity. They discuss:

    -John’s origin story and influences - what led to the creation of Zero Trust?
    -Zero Trust - origin, design principles, and terminology
    -What are your protect surfaces? - using Zero Trust
    -John’s new position at ON2IT
  • Creator of Zero Trust John Kindervag Talks Origins and the Future of Zero Trust! Apr 13 2021 9:30 am UTC 39 mins
    Digital Shadows CISO, Rick Holland and ON2IT Senior VP, Cybersecurity Strategy, John Kindervag
    Digital Shadows CISO Rick hosts this edition of ShadowTalk. He’s joined by special guest John Kindervag, creator of Zero Trust and Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow at ON2IT Cybersecurity. They discuss:

    -John’s origin story and influences - what led to the creation of Zero Trust?
    -Zero Trust - origin, design principles, and terminology
    -What are your protect surfaces? - using Zero Trust
    -John’s new position at ON2IT
  • Podcast: It’s A Ransomware Round-Up - CNA , Clop, and Much More! Recorded: Apr 9 2021 49 mins
    Digital Shadows Threat Researchers, Kim Bromley, Chris Morgan, Stefano De Blasi, and Dylan Gray
    ShadowTalk hosts Stefano, Dylan, Kim, and Chris bring you the latest in threat intelligence. This week they cover:
    -Kim and her recent ransomware round-up - insurance company CNA suffers attack, Clop holds victims for ransom, and more
    -Chris takes the team through the PHP Git Server backdoor
    -Dylan and the group talk pandemic, remote-working, and cyber hygiene
  • Podcast: It’s A Ransomware Round-Up - CNA , Clop, and Much More! Recorded: Apr 9 2021 49 mins
    Digital Shadows Threat Researchers, Kim Bromley, Chris Morgan, Stefano De Blasi, and Dylan Gray
    ShadowTalk hosts Stefano, Dylan, Kim, and Chris bring you the latest in threat intelligence. This week they cover:
    -Kim and her recent ransomware round-up - insurance company CNA suffers attack, Clop holds victims for ransom, and more
    -Chris takes the team through the PHP Git Server backdoor
    -Dylan and the group talk pandemic, remote-working, and cyber hygiene
  • Demystifying the Dark Web Recorded: Apr 6 2021 39 mins
    Digital Shadows Senior Sales Engineer Matthew Quinn and Director of Professional Services Nadim Khater
    The dark web is a mysterious unknown for many organizations. Unfortunately, gaining visibility into these locations is extremely challenging. Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.


    In this webinar, attendees will learn about:

    - How to mitigate risks from the dark web and best practices for data loss
    prevention
    - The blueprint of the dark web and the corresponding threats
    - How to gain visibility into dark web threats for proactive threat mitigation
    - Fortifying defenses for maximum data protection and how to work with
    law enforcement to proactively manage threats.
    - How Digital Shadows can help protect your organization
  • Demystifying the Dark Web Recorded: Apr 6 2021 39 mins
    Digital Shadows Senior Sales Engineer Matthew Quinn and Director of Professional Services Nadim Khater
    The dark web is a mysterious unknown for many organizations. Unfortunately, gaining visibility into these locations is extremely challenging. Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.


    In this webinar, attendees will learn about:

    - How to mitigate risks from the dark web and best practices for data loss
    prevention
    - The blueprint of the dark web and the corresponding threats
    - How to gain visibility into dark web threats for proactive threat mitigation
    - Fortifying defenses for maximum data protection and how to work with
    law enforcement to proactively manage threats.
    - How Digital Shadows can help protect your organization
  • Podcast: More on Microsoft and Acer Receives $50 Million in Ransom Demands Recorded: Apr 2 2021 21 mins
    Threat Researchers Alec Alvarado, Charles Ragland, Austin Merritt, and Digital Shadows CISO, Rick Holland
    ShadowTalk hosts Alec, Austin, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
    -The team discusses the latest on Exchange Servers vulnerabilities - should guards still be up?
    -Austin takes us through the timeline of ransomware taking advantage of vulnerabilities regarding Microsoft
    -Austin talks $50 million ransom against Acer - biggest known ransom request in modern history. What does this mean for the threat landscape going forward?
    -A phishing campaign has stolen 400,000 OWA/O365 creds - how to make yourself the hardest target possible
  • Podcast: More on Microsoft and Acer Receives $50 Million in Ransom Demands Recorded: Apr 2 2021 21 mins
    Threat Researchers Alec Alvarado, Charles Ragland, Austin Merritt, and Digital Shadows CISO, Rick Holland
    ShadowTalk hosts Alec, Austin, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
    -The team discusses the latest on Exchange Servers vulnerabilities - should guards still be up?
    -Austin takes us through the timeline of ransomware taking advantage of vulnerabilities regarding Microsoft
    -Austin talks $50 million ransom against Acer - biggest known ransom request in modern history. What does this mean for the threat landscape going forward?
    -A phishing campaign has stolen 400,000 OWA/O365 creds - how to make yourself the hardest target possible
  • Initial Access Brokers - A Deep Dive Recorded: Mar 30 2021 41 mins
    Digital Shadows Threat Researchers Stefano De Blasi and Alec Alvarado
    The past 12 months have seen a significant increase in the number of ransomware variants, ransomware targets, and ransomware payments. This rise in ransomware has been helped by another pernicious trend: the risk of initial access brokers. A sharp increase in remote work, among other things, has helped initial access brokers (IAB) reach their full potential. Plus, their work is increasingly lucrative with access selling for an average of $7,100.

    We're taking a closer look at IAB activity and how you can mitigate risks associated with these threat actors. In this webinar we cover:

    - How Initial Access Brokers give rise to ransomware
    - The different types of access most commonly sold
    - How the rise in remote work has caused additional challenges
    - The most common geographies targeted
    - How cybercriminals use this access and what that means for your
    business
  • Initial Access Brokers - A Deep Dive Recorded: Mar 30 2021 41 mins
    Digital Shadows Threat Researchers Stefano De Blasi and Alec Alvarado
    The past 12 months have seen a significant increase in the number of ransomware variants, ransomware targets, and ransomware payments. This rise in ransomware has been helped by another pernicious trend: the risk of initial access brokers. A sharp increase in remote work, among other things, has helped initial access brokers (IAB) reach their full potential. Plus, their work is increasingly lucrative with access selling for an average of $7,100.

    We're taking a closer look at IAB activity and how you can mitigate risks associated with these threat actors. In this webinar we cover:

    - How Initial Access Brokers give rise to ransomware
    - The different types of access most commonly sold
    - How the rise in remote work has caused additional challenges
    - The most common geographies targeted
    - How cybercriminals use this access and what that means for your
    business
  • Podcast: Ransomware Resurgence - The Return of FIN8, DarkSide, and More! Recorded: Mar 26 2021 42 mins
    Digital Shadows Threat Researchers, Kim Bromley, Chris Morgan, Stefano De Blasi, and Adam Cook
    ShadowTalk hosts Stefano, Adam, Kim, and first-timer Chris bring you the latest in threat intelligence. This week they cover:
    -Kim takes us through the return of FIN8 - what are the updates to the “BadHatch” backdoor
    -Chris discusses DarkSide's recent resurgence after a quiet period - what’s the latest?
    -Microsoft Exchange exploit update - the team discuss
    -How are threat actors and cybercriminals using ProxyLogon vulnerabilities?
  • Podcast: Ransomware Resurgence - The Return of FIN8, DarkSide, and More! Recorded: Mar 26 2021 42 mins
    Digital Shadows Threat Researchers, Kim Bromley, Chris Morgan, Stefano De Blasi, and Adam Cook
    ShadowTalk hosts Stefano, Adam, Kim, and first-timer Chris bring you the latest in threat intelligence. This week they cover:
    -Kim takes us through the return of FIN8 - what are the updates to the “BadHatch” backdoor
    -Chris discusses DarkSide's recent resurgence after a quiet period - what’s the latest?
    -Microsoft Exchange exploit update - the team discuss
    -How are threat actors and cybercriminals using ProxyLogon vulnerabilities?
  • Podcast: Supply Chain Compromise Round-Up - Microsoft, Verkada, and More Recorded: Mar 19 2021 24 mins
    Threat Researchers Alec Alvarado, Charles Ragland, Austin Merritt, and Ivan Righi
    ShadowTalk hosts Alec, Ivan, Charles, and Austin bring you the latest in threat intelligence. This week they cover:
    - The team discuss HAFNIUM and Microsoft Servers Exchange
    - Updates on the Accellion incident - what’s the latest regarding Flagstar?
    - The Verkada compromise - who were the victims affected by the breach of private video footage?
  • Podcast: Supply Chain Compromise Round-Up - Microsoft, Verkada, and More Recorded: Mar 19 2021 24 mins
    Threat Researchers Alec Alvarado, Charles Ragland, Austin Merritt, and Ivan Righi
    ShadowTalk hosts Alec, Ivan, Charles, and Austin bring you the latest in threat intelligence. This week they cover:
    - The team discuss HAFNIUM and Microsoft Servers Exchange
    - Updates on the Accellion incident - what’s the latest regarding Flagstar?
    - The Verkada compromise - who were the victims affected by the breach of private video footage?
The Leader in Digital Risk Protection
Digital Shadows SearchLight protects organizations against external risk exposure. Organizations register their company names, brand names, domains, and document marketings for monitoring. Through the SearchLight portal, we provide the most relevant and critical digital risks with complete visibility, context, recommended actions, and ways to remediate the risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Initial Access Brokers - A Deep Dive
  • Live at: Mar 30 2021 9:30 am
  • Presented by: Digital Shadows Threat Researchers Stefano De Blasi and Alec Alvarado
  • From:
Your email has been sent.
or close