InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Catching Phish: How To Spot Phishing Attacks In The Wild

Presented by

Guy Almog, Threat Intelligence Team Lead at Cyberint

About this talk

Adversaries often deploy phishing attacks because they are reliably effective. A staggering 41% of corporate security incidents involve phishing for initial access, according to recent research from IBM. In this webinar, Cyberint Threat Intelligence Team Lead Guy Almog will discuss the phishing threat landscape and teach you to catch phishing attacks before you fall victim. Guy will show several examples of real phishing sites in the wild while a panel of Cyberint employees will try to spot the signs that the site is malicious. Webinar attendees are invited to play along and identify the indicators of a phishing site as the real-world examples are reviewed. Join us for this webinar to see if you can catch the phish.
Cyberint, now a Check Point Company

Cyberint, now a Check Point Company

13559 subscribers41 talks
Impactful intelligence to help you detect & defeat cyber risks faster
Cyberint is now a Check Point Company. Its impactful intelligence solution combines cyber threat intelligence, external attack surface management, brand protection, and digital supply chain intelligence into a single, powerful solution. By leveraging autonomous discovery of all of an organization’s external-facing assets, coupled with open, deep & dark web intelligence, the solution enables cybersecurity teams to accelerate the detection and disruption of their most pressing cyber risks. Global customers, including Fortune 500 leaders across all major market verticals, rely on us to prevent, detect, investigate, and remediate phishing, malware, fraud, brand abuse, data leaks, external vulnerabilities, and more, ensuring continuous external protection from cyber threats.
Related topics