Webinars On-Demand | Intel471 Skip to content
Resources

Webinars On-Demand

Homepage Hero
Guests Check-in, Cybercriminals Cash-out: Protecting Payment Data from Phishing Attacks
Sep 10, 2024

Guests Check-in, Cybercriminals Cash-out: Protecting Payment Data from Phishing Attacks

In this webinar, you’ll learn how one cybercrime and fraud operation is targeting hotel guest payment card data in hotel booking systems. They’re not just abusing Booking.com’s brand in phishing emails, but using compromised hotel partner Booking.com accounts to send messages to guests in the official Booking.com app and emails requesting “mandatory payment” before their upcoming stay.

Threat Hunting Workshop: Hunting for Collection
Aug 27, 2024

Threat Hunting Workshop: Hunting for Collection

With Intel 471’s powerful in-depth cyber threat intelligence and HUNTER Platform, we will demonstrate how to effectively transition from intelligence to precise, operationalized threat hunting for collection.

Are They Who They Say They Are? An Introduction to Know-Your-Customer Fraud April 2024
Jul 16, 2024

Are They Who They Say They Are? An Introduction to Know-Your-Customer Fraud April 2024

Rapid digitalization and demand for online services have rendered Know-Your-Customer (KYC) identity verification processes a must for financial institutions and beyond to protect against fraud.

On the Money: The Top Cyber Threats to the Banking Industry Mar. 2024
Mar 20, 2024

On the Money: The Top Cyber Threats to the Banking Industry Mar. 2024

Threat actors have the banking industry in their sights. The lucrative outcomes that a successful attack on an organization can provide and the industry’s growing digitization have created the perfect storm of motivation and opportunity for threat actors.

Keys to the Kingdom: An Analysis of Ransomware and Access Trends in 2023 Feb. 2024
Feb 21, 2024

Keys to the Kingdom: An Analysis of Ransomware and Access Trends in 2023 Feb. 2024

Ransomware deployments are increasing each year, and so are the sophistication of the attacks. Without initial access to an organization, these attacks would not be possible. In today’s highly digital world, protecting your systems has never been more important, and that begins with understanding how ransomware actors get in.

Threat Hunting Workshop 9: Hunting for Privilege Escalation
Jan 24, 2024

Threat Hunting Workshop 9: Hunting for Privilege Escalation

Get ready to elevate your threat hunting skills with Intel 471's exhilarating and interactive workshop, focusing on the pivotal MITRE ATT&CK Tactic: Privilege Escalation. This isn't just another workshop; it's an opportunity to immerse yourself in the world of advanced threat hunting, guided by the expertise of Intel 471's seasoned hunters.

Crashing the Party: How to Leverage CTI to Mitigate Supply Chain Risk Jan. 2024
Jan 24, 2024

Crashing the Party: How to Leverage CTI to Mitigate Supply Chain Risk Jan. 2024

As supply chains have increased in complexity and interconnectivity, so too have operational demands for digital solutions to monitor and manage them more efficiently. In tandem with these developments, cybercriminal actors have pursued and scaled new methods to monetize fraud and disruption across supply chains.

Malware 101: Power up your investigations; Protect your organization. Dec. 2023
Dec 13, 2023

Malware 101: Power up your investigations; Protect your organization. Dec. 2023

Malware attacks continue to increase in velocity and sophistication. No industry is safe from being targeted by the threat actors driving them. Invaluable insights and details about a cyber incident can be gleaned through malware analysis but it can be an intimidating topic, especially to those new to the field.

Bypassing With Bots: How Adversaries Use Automated Services to Sidestep OTPs Oct. 2023
Oct 18, 2023

Bypassing With Bots: How Adversaries Use Automated Services to Sidestep OTPs Oct. 2023

Not all passwords are created equal. They may range from silly to scure, but one thing they have in common is that they’re the gateway into sensitive information. The good news is that tools like multi-factor authentication (MFA) and one-time passwords (OTP) have made it more complicated for cybercriminals to take over accounts with access to only one simple username and password. Or have they?

Mastering the Hunt: Translating Intelligence to Action
Oct 12, 2023

Mastering the Hunt: Translating Intelligence to Action

Join us in "Mastering the Hunt," where we delve into the technical intricacies of merging cyber threat intelligence with behavioral threat hunting.