Using Intel 471 Intelligence to Prevent Ransomware Attacks
This webinar looks into the cyber underground and shows how you can identify precursors for a ransomware attack to orient your defenses and stay one step ahead of your adversaries.
Busting a Myth: Overlap Between Nation State & Financially Motivated Cybercrime
In this webinar, you'll discover the undeniable link between Nation-State and Financially Motivated cybercrime.
Ransomware Dramas Why Focusing On Ransomware Itself is Not Enough
In this session, we look at the ecosystem that aids in the deployment of ransomware as well as the key actors and steps involved in a typical attack
Using A Data Driven Approach to Defend Against Cyber Threats
Learn from CLEAR, Intel 471, and ThreatQuotient professionals, who share their tactical and strategic experience regarding how cybersecurity professionals have successfully addressed similar challenges
Ransomware: Attackers vs Defenders
Join us as our presenters use Intel 471's knowledge of the underground and Unit 42's experience with ransomware incident response cases to reveal how threat actors find their victims, gain entry, and deploy ransomware.

Bottom Feeders: Initial Access Broker Activity Examined
Learn about initial access offerings in the cyber underground and gain insights into the activity patterns of the most prominent IABs.

Sidestepping a Cyber Car Crash in Matrix Time
Ransomware is like a slow-moving car crash. Incidents don't occur in an instant. The cyber underground is ripe with indicators that can predict an attack weeks or months before the event occurs.

7 Habits of Cybercriminals
This webinar presents the results of an analysis of more than 12 years of tracking and reporting on a variety of actors and groups in the cyber underground, which allowed us to identify seven specific habits of highly effective actors

Four Ways the Cyber Underground is like the Middle Ages
In many ways, the cyber underground strongly resembles Medieval Italy or the Wild West. This webinar discusses how to increase your cyber protection by learning from history.

How a CTI Framework Catapults Your Cyber Security Program
Join us for a discussion on how to build the right CTI Framework, fueled by General Intelligence Requirements (GIRs), to help you elevate your cyber defense and catapult your cybersecurity program to success.