Lifting the Covers on RansomHub's Rise
RansomHub is now the top Ransomware-as-a-Service (RaaS) affiliate program since it hit the ransomware scene in February 2024. RansomHub claimed responsibility for 15% of over 1,000 ransomware breaches that Intel 471 tracked in Q3 2024.
U.S. Elections 2024: What To Do About Pink Slime Overtaking Local News?
So-called “pink slime” news sites are filling an information void left by a U.S. local news industry in rapid decline. What can be done to control the integrity of online news in this environment? And how much of a threat to democracy is pink slime journalism in an election year?
Threat Hunting Workshop: Hunting for Discovery
Our workshop will unpack the intricacies of the Discovery tactic, exploring the methods adversaries use to identify sensitive information and map out environments. We'll dive into the most prevalent techniques adversaries employ for Discovery and, most importantly, show how to detect and counter these maneuvers in your environment.
Guests Check-in, Cybercriminals Cash-out: Protecting Payment Data from Phishing Attacks
In this webinar, you’ll learn how one cybercrime and fraud operation is targeting hotel guest payment card data in hotel booking systems. They’re not just abusing Booking.com’s brand in phishing emails, but using compromised hotel partner Booking.com accounts to send messages to guests in the official Booking.com app and emails requesting “mandatory payment” before their upcoming stay.
Threat Hunting Workshop: Hunting for Collection
With Intel 471’s powerful in-depth cyber threat intelligence and HUNTER Platform, we will demonstrate how to effectively transition from intelligence to precise, operationalized threat hunting for collection.
Threat Hunting Workshop: Hunting for Command and Control
Our workshop will unpack the intricacies of command and control, exploring the methods adversaries employ to use this tactic. We'll explore the most prevalent techniques used for command and control and, most importantly, show how to detect and counter these maneuvers in your environment.
Are They Who They Say They Are? An Introduction to Know-Your-Customer Fraud April 2024
Rapid digitalization and demand for online services have rendered Know-Your-Customer (KYC) identity verification processes a must for financial institutions and beyond to protect against fraud.
On the Money: The Top Cyber Threats to the Banking Industry Mar. 2024
Threat actors have the banking industry in their sights. The lucrative outcomes that a successful attack on an organization can provide and the industry’s growing digitization have created the perfect storm of motivation and opportunity for threat actors.
Threat Hunting Workshop 10: Hunting for Initial Access
Dive deep into the nuances of Initial Access, a critical area in the cybersecurity landscape. Our workshop will unpack the intricacies of this tactic, exploring the methods adversaries employ to escalate their privileges, and the clever tactics they use. We'll delve into the most prevalent techniques used for I and, crucially, show Initial Access and how to detect and counter these maneuvers in your environment.
Keys to the Kingdom: An Analysis of Ransomware and Access Trends in 2023 Feb. 2024
Ransomware deployments are increasing each year, and so are the sophistication of the attacks. Without initial access to an organization, these attacks would not be possible. In today’s highly digital world, protecting your systems has never been more important, and that begins with understanding how ransomware actors get in.