Featured
Defending Against Fog Threat Actors— How Adlumin Stopped a Ransomware Attack in Its Tracks
Kevin O’Connor, Director of Threat Reseach, and Will Ledesma, Senior MDR Director
"Fog," a variant of the STOP/DJVU ransomware family, exploits compromised VPN credentials to breach defenses. In August 2024, a mid-sized financial institution became the first in its sector to be targeted by this variant, but Adlumin’s technology isolated and locked the attackers out.
Join Adlumin experts, Kevin O’Connor, Director of Threat Research, and Will Ledesma, Senior Managed Detection and Response Director, as they walk you through the details of the recent attack, and how Adlumin’s Ransomware Prevention and Exfiltration feature thwarted the attack in its early stages, containing the threat before it could cause any damage.
Key Takeaways:
- An overview of international FOG threat actors and their evolving tactics
- A step-by-step breakdown of the data breach attempt and how Adlumin’s Ransomware Prevention stopped the attack
- Best practices for strengthening your organization's defense against similar threats from cross-border cyber attacks
Whether you're a cybersecurity professional or an IT leader, this webinar will provide valuable insights and actionable strategies to keep your organization from the ever-present threat of global Fog threat actors.
All episodes
-
Cybercrime - Working with the FBI: Become Empowered. Not a Victim.
Steve Lupo, Special Agent, FBI Houston Cyber Task Force/FBI SWAT and Mark Sangster, VP, Chief of Strategy, Adlumin
Cybercrime is a two-sided coin. On the one side, the industrialization of cybercrime and ransomware will operate with impunity. Meaning attack volumes and sophistication will continue to rise. On the other side, far too many organizations think they are not a target and are incapable of stopping sophisticated cyber adversaries.
Join industry expert and author Mark Sangster and FBI Special Agent Steve Lupo as they dispel misconceptions, expose trends, and explore ways to work with law enforcement. Learn how to protect your business before it falls victim to the next headline-writing cyberattack.
-
‘Tis the Season. The Twelve Gifts of Cyber.
Mark Sangster, Vice President, Chief of Strategy, Adlumin and Kevin O’Connor, Director of Threat Research, Adlumin
On the first day of access, the criminal deployed to me, ransomware delivered remotely!
Join author and Chief of Strategy Mark Sangster, and threat intelligence veteran Kevin O'Connor as they take a whimsical look at 12 cyber trends and lessons covering ransomware attacks, Gootloader gang activity, and cyber stocking stuffers. You'll also hear directly from customers how Adlumin's helping them enjoy and relax over the holidays.
What you will learn
- New findings in ransomware trends and how to protect against them
- Lessons learned about Gootloader gang (definitely on the naughty list)
- How to give a boost to your EDR and NGAV
- Why continuous vulnerability management helps to keep the grinch away -
Enterprise Strategy Group’s ransomware survival guide
Mark Sangster, Chief of Strategy, Adlumin & Dave Gruber, Principal Analyst, ESG
According to Enterprise Strategy Group’s independent research, 79% of today’s organizations have experienced a ransomware attack in the past 12 months. The hard truth is, many businesses think they’re prepared – that is, until ransomware actually strikes.
In this session, ESG Principal Analyst Dave Gruber presents essential threat intelligence and actionable insights based on his extensive field experience regarding the top ransomware trends today and best practices for surviving an attack. Topics covered inside include:
• Ransomware by-the-numbers: ESG’s most pressing threat statistics
• Critical decision points during an attack (and why they matter)
• ESG’s unbiased advice for achieving a winning ransomware defense strategy
• And much more. -
Real Life Stories of Ransomware and Recovery
Mark Sangster, VP and Chief of Strategy
Ransomware continues to make headlines as attacks impact various industries including healthcare, education, and, more recently, car dealerships. As cybercriminals expand their targets, organizations need to consider not only how to prevent ransomware but also how to mitigate it when an attack happens.
Join Mark Sangster, VP, Chief of Strategy, as he breaks down real-world cybercrime examples from his upcoming book Cyber-Conscious Leadership: A Practical Guide to Protecting Your Organization Against Cyber Crime. Additionally, Sangster will explore Adlumin’s new ransomware feature.
Watch to:
- Understand ransomware’s lifecycle and what methods cybercriminals use to infiltrate an organization
- Evaluate real-world examples from Sangster’s anticipated second book
- Implement strategies to teach your employees how to spot ransomware techniquesAs a thank you for joining the webinar, we’ll share our Threat Insights 2024 Volume II with all attendees during the session.
-
Defending Against Fog Threat Actors— How Adlumin Stopped a Ransomware Attack in Its Tracks
Kevin O’Connor, Director of Threat Reseach, and Will Ledesma, Senior MDR Director
"Fog," a variant of the STOP/DJVU ransomware family, exploits compromised VPN credentials to breach defenses. In August 2024, a mid-sized financial institution became the first in its sector to be targeted by this variant, but Adlumin’s technology isolated and locked the attackers out.
Join Adlumin experts, Kevin O’Connor, Director of Threat Research, and Will Ledesma, Senior Managed Detection and Response Director, as they walk you through the details of the recent attack, and how Adlumin’s Ransomware Prevention and Exfiltration feature thwarted the attack in its early stages, containing the threat before it could cause any damage.
Key Takeaways:
- An overview of international FOG threat actors and their evolving tactics
- A step-by-step breakdown of the data breach attempt and how Adlumin’s Ransomware Prevention stopped the attack
- Best practices for strengthening your organization's defense against similar threats from cross-border cyber attacksWhether you're a cybersecurity professional or an IT leader, this webinar will provide valuable insights and actionable strategies to keep your organization from the ever-present threat of global Fog threat actors.