Webinars On-Demand | Intel 471 Skip to content
Resources

Webinars On-Demand

Homepage Hero
Lifting the Covers on RansomHub's Rise
Nov 15, 2024

Lifting the Covers on RansomHub's Rise

RansomHub is now the top Ransomware-as-a-Service (RaaS) affiliate program since it hit the ransomware scene in February 2024. RansomHub claimed responsibility for 15% of over 1,000 ransomware breaches that Intel 471 tracked in Q3 2024.

U.S. Elections 2024: What To Do About Pink Slime Overtaking Local News?
Oct 23, 2024

U.S. Elections 2024: What To Do About Pink Slime Overtaking Local News?

So-called “pink slime” news sites are filling an information void left by a U.S. local news industry in rapid decline. What can be done to control the integrity of online news in this environment? And how much of a threat to democracy is pink slime journalism in an election year?

Threat Hunting Workshop: Hunting for Discovery
Oct 22, 2024

Threat Hunting Workshop: Hunting for Discovery

Our workshop will unpack the intricacies of the Discovery tactic, exploring the methods adversaries use to identify sensitive information and map out environments. We'll dive into the most prevalent techniques adversaries employ for Discovery and, most importantly, show how to detect and counter these maneuvers in your environment.

Guests Check-in, Cybercriminals Cash-out: Protecting Payment Data from Phishing Attacks
Sep 10, 2024

Guests Check-in, Cybercriminals Cash-out: Protecting Payment Data from Phishing Attacks

In this webinar, you’ll learn how one cybercrime and fraud operation is targeting hotel guest payment card data in hotel booking systems. They’re not just abusing Booking.com’s brand in phishing emails, but using compromised hotel partner Booking.com accounts to send messages to guests in the official Booking.com app and emails requesting “mandatory payment” before their upcoming stay.

Threat Hunting Workshop: Hunting for Collection
Aug 27, 2024

Threat Hunting Workshop: Hunting for Collection

With Intel 471’s powerful in-depth cyber threat intelligence and HUNTER Platform, we will demonstrate how to effectively transition from intelligence to precise, operationalized threat hunting for collection.

Threat Hunting Workshop: Hunting for Command and Control
Jul 31, 2024

Threat Hunting Workshop: Hunting for Command and Control

Our workshop will unpack the intricacies of command and control, exploring the methods adversaries employ to use this tactic. We'll explore the most prevalent techniques used for command and control and, most importantly, show how to detect and counter these maneuvers in your environment.

Are They Who They Say They Are? An Introduction to Know-Your-Customer Fraud April 2024
Jul 16, 2024

Are They Who They Say They Are? An Introduction to Know-Your-Customer Fraud April 2024

Rapid digitalization and demand for online services have rendered Know-Your-Customer (KYC) identity verification processes a must for financial institutions and beyond to protect against fraud.

On the Money: The Top Cyber Threats to the Banking Industry Mar. 2024
Mar 20, 2024

On the Money: The Top Cyber Threats to the Banking Industry Mar. 2024

Threat actors have the banking industry in their sights. The lucrative outcomes that a successful attack on an organization can provide and the industry’s growing digitization have created the perfect storm of motivation and opportunity for threat actors.

Threat Hunting Workshop 10: Hunting for Initial Access
Mar 20, 2024

Threat Hunting Workshop 10: Hunting for Initial Access

Dive deep into the nuances of Initial Access, a critical area in the cybersecurity landscape. Our workshop will unpack the intricacies of this tactic, exploring the methods adversaries employ to escalate their privileges, and the clever tactics they use. We'll delve into the most prevalent techniques used for I and, crucially, show Initial Access and how to detect and counter these maneuvers in your environment.

Keys to the Kingdom: An Analysis of Ransomware and Access Trends in 2023 Feb. 2024
Feb 21, 2024

Keys to the Kingdom: An Analysis of Ransomware and Access Trends in 2023 Feb. 2024

Ransomware deployments are increasing each year, and so are the sophistication of the attacks. Without initial access to an organization, these attacks would not be possible. In today’s highly digital world, protecting your systems has never been more important, and that begins with understanding how ransomware actors get in.