Top Cover 4 – Threat Hunting Management Workshop: Hiring Effective Threat Hunters
Intel 471's Top Cover workshop invites you to this session on hiring threat hunters, where we’ll explore strategies for building and managing a high-performing team.
NIS2: Achieving Digital Resilience Within Europe's Critical Sectors
This is a must-see webinar for all entities in scope of NIS2. Hosted by Intel 471 content manager Liam Tung, you’ll hear Dekker’s insights on how ENISA and the EU will help improve cybersecurity, resilience, and preparedness for today’s evolving threat environment.
Threat Hunting Workshop 14: Hunting for Initial Access - Level 2
Intel 471 is excited to introduce the first in our new Level 2 Threat Hunting Workshop series, designed for those ready to take on greater challenges. This inaugural session focuses on Initial Access, offering progressive threat hunting training that provides a deeper and more rigorous exploration of this tactic.
Lifting the Covers on RansomHub's Rise
RansomHub is now the top Ransomware-as-a-Service (RaaS) affiliate program since it hit the ransomware scene in February 2024. RansomHub claimed responsibility for 15% of over 1,000 ransomware breaches that Intel 471 tracked in Q3 2024.
U.S. Elections 2024: What To Do About Pink Slime Overtaking Local News?
So-called “pink slime” news sites are filling an information void left by a U.S. local news industry in rapid decline. What can be done to control the integrity of online news in this environment? And how much of a threat to democracy is pink slime journalism in an election year?
Threat Hunting Workshop 13: Hunting for Discovery - Level 1
Our workshop will unpack the intricacies of the Discovery tactic, exploring the methods adversaries use to identify sensitive information and map out environments. We'll dive into the most prevalent techniques adversaries employ for Discovery and, most importantly, show how to detect and counter these maneuvers in your environment.
Guests Check-in, Cybercriminals Cash-out: Protecting Payment Data from Phishing Attacks
In this webinar, you’ll learn how one cybercrime and fraud operation is targeting hotel guest payment card data in hotel booking systems. They’re not just abusing Booking.com’s brand in phishing emails, but using compromised hotel partner Booking.com accounts to send messages to guests in the official Booking.com app and emails requesting “mandatory payment” before their upcoming stay.
Threat Hunting Workshop 12: Hunting for Collection - Level 1
With Intel 471’s powerful in-depth cyber threat intelligence and HUNTER Platform, we will demonstrate how to effectively transition from intelligence to precise, operationalized threat hunting for collection.
Threat Hunting Workshop 11: Hunting for Command and Control - Level 1
Our workshop will unpack the intricacies of command and control, exploring the methods adversaries employ to use this tactic. We'll explore the most prevalent techniques used for command and control and, most importantly, show how to detect and counter these maneuvers in your environment.
Are They Who They Say They Are? An Introduction to Know-Your-Customer Fraud April 2024
Rapid digitalization and demand for online services have rendered Know-Your-Customer (KYC) identity verification processes a must for financial institutions and beyond to protect against fraud.