Featured
Defending Against Fog Threat Actors— How Adlumin Stopped a Ransomware Attack in Its Tracks
Kevin O’Connor, Director of Threat Reseach, and Will Ledesma, Senior MDR Director
"Fog," a variant of the STOP/DJVU ransomware family, exploits compromised VPN credentials to breach defenses. In August 2024, a mid-sized financial institution became the first in its sector to be targeted by this variant, but Adlumin’s technology isolated and locked the attackers out.
Join Adlumin experts, Kevin O’Connor, Director of Threat Research, and Will Ledesma, Senior Managed Detection and Response Director, as they walk you through the details of the recent attack, and how Adlumin’s Ransomware Prevention and Exfiltration feature thwarted the attack in its early stages, containing the threat before it could cause any damage.
Key Takeaways:
- An overview of international FOG threat actors and their evolving tactics
- A step-by-step breakdown of the data breach attempt and how Adlumin’s Ransomware Prevention stopped the attack
- Best practices for strengthening your organization's defense against similar threats from cross-border cyber attacks
Whether you're a cybersecurity professional or an IT leader, this webinar will provide valuable insights and actionable strategies to keep your organization from the ever-present threat of global Fog threat actors.
All episodes
-
Threat Hunting that Protects Your Business from Cyber Risks
Mark Sangster, Vice President, Chief of Strategy, Adlumin and Kevin O’Connor, Director of Threat Research, Adlumin
Malware poses a significant threat to businesses across all industries. Cybercriminals operate like Fortune 500 companies, optimizing their operations with superior technology and expertise, and increasing revenue in terms of ransoms and other illicit gains from their attacks. As criminals uplevel their ability to infiltrate and exploit your business, proactive threat hunting is non-negotiable when it comes to stopping malware-based attacks before they become business disrupting or cripple operations.
Join Adlumin's Director of Threat Research, Kevin O'Connor, as he unpacks real-life examples of how Adlumin’s Threat Intel Team leverages observables and Indicators of Compromise (IoCs) to stop attacks in their tracks.
-
Cybercrime - Working with the FBI: Become Empowered. Not a Victim.
Steve Lupo, Special Agent, FBI Houston Cyber Task Force/FBI SWAT and Mark Sangster, VP, Chief of Strategy, Adlumin
Cybercrime is a two-sided coin. On the one side, the industrialization of cybercrime and ransomware will operate with impunity. Meaning attack volumes and sophistication will continue to rise. On the other side, far too many organizations think they are not a target and are incapable of stopping sophisticated cyber adversaries.
Join industry expert and author Mark Sangster and FBI Special Agent Steve Lupo as they dispel misconceptions, expose trends, and explore ways to work with law enforcement. Learn how to protect your business before it falls victim to the next headline-writing cyberattack.
-
Protecting Your Organization with Proactive Defense Programs
Mark Sangster, Vice President, Chief of Strategy at Adlumin, Jeff Garner, Channel Account Manager at KnowBe4
Most crippling cyberattacks begin with a simple phishing email. And while most companies provide some form of annual training and testing, they focus on overly simplistic lures that fail to represent the real danger of targeted campaigns. Join our panel of experts from Adlumin and KnowBe4 as they explore how to build a comprehensive training and testing program that leverages realistic threat scenarios to foster context-relevant security awareness and phishing testing that drives meaningful behavioral change across your organization.
- Use risk management data and accurate phishing lures to build comprehensive awareness training
- Maximize your resources and programs to increase return on investment
- Conduct testing that improves resilience
- Meet regulatory requirements and demonstrate program success to your leadership -
Threat Hunting that Protects Your Business from Cyber Risks
Mark Sangster, Vice President, Chief of Strategy, Adlumin and Kevin O’Connor, Director of Threat Research, Adlumin
Malware poses a significant threat to businesses across all industries. Cybercriminals operate like Fortune 500 companies, optimizing their operations with superior technology and expertise, and increasing revenue in terms of ransoms and other illicit gains from their attacks. As criminals uplevel their ability to infiltrate and exploit your business, proactive threat hunting is non-negotiable when it comes to stopping malware-based attacks before they become business disrupting or cripple operations.
Join Adlumin's Director of Threat Research, Kevin O'Connor, as he unpacks real-life examples of how Adlumin’s Threat Intel Team leverages observables and Indicators of Compromise (IoCs) to stop attacks in their tracks.
-
Don’t Get Cyber Snagged: Recognizing and Reporting Suspicious Activity
Mark Sangster, Vice President, Chief of Strategy, Adlumin and Kevin O’Connor, Director of Threat Research, Adlumin
Sophisticated criminals and state-sponsored actors rely on various phishing techniques to harvest sensitive data, steal credentials or deploy malware. Far too many companies and employees think phishing lures are obvious and easy to spot. Sophisticated cyber campaigns use previously stolen insider information and credentials to create legitimate-looking requests that appear to come from industry colleagues. Join security expert and author, Mark Sangster and threat intelligence veteran, Kevin O’Connor as they review emerging threats and attack techniques, and unpack the latest exploitations, and growing trends in the threat landscape.
What You Will Learn
- Explore the latest phishing trends and tactics
- Expand your ability to identify suspicious activity and report it
- Build defenses to protect your employees in the office and their homework environments -
Tackling the Patching Pandemic to Protect Your Business
Mark Sangster, Vice President, Chief of Strategy at Adlumin, Skylar Moran, Director of Customer Success, Adlumin
They say you're only as good as your weakest link. Cybercriminals routinely use vulnerabilities in IT infrastructure to infiltrate the business, steal assets or launch a massive ransomware attack. Keeping up with vulnerabilities and patching requirements is already an IT challenge. Now with exploits like SolarWinds, Kaseya, and the Microsoft Exchange HAFNIUM the problem is only getting worse.
Join experts from Adlumin as they tackle the patching pandemic, demonstrate simplified management of core systems, and how to avoid crippling attacks that exploit your defenses.
What will I learn?
- Why ransomware-as-a-service and the industrialization of cybercrime accelerate attacks and increase the number of adversaries who can enter the market
- Best practices to reduce the cracks in your defenses that are often leveraged by criminals.
- How continuous vulnerability management creates a centralized approach to patch management and identifying critical vulnerabilities. -
‘Tis the Season. The Twelve Gifts of Cyber.
Mark Sangster, Vice President, Chief of Strategy, Adlumin and Kevin O’Connor, Director of Threat Research, Adlumin
On the first day of access, the criminal deployed to me, ransomware delivered remotely!
Join author and Chief of Strategy Mark Sangster, and threat intelligence veteran Kevin O'Connor as they take a whimsical look at 12 cyber trends and lessons covering ransomware attacks, Gootloader gang activity, and cyber stocking stuffers. You'll also hear directly from customers how Adlumin's helping them enjoy and relax over the holidays.
What you will learn
- New findings in ransomware trends and how to protect against them
- Lessons learned about Gootloader gang (definitely on the naughty list)
- How to give a boost to your EDR and NGAV
- Why continuous vulnerability management helps to keep the grinch away -
The Evolving Role of the Banker in Today's Cyber Landscape
Mark Sangster, VP, Adlumin, Pam Kaur, Head of Bank Technology, BankTech Ventures, & David Shipley, CEO, Beauceron Security
Cybersecurity culture is more than just awareness. It requires employees from all departments to participate in the broader corporate culture of daily actions, encouraging them to make mindful decisions that align with security policies. Join a panel of industry experts from Adlumin, BankTech Ventures, and Beauceron Security as they discuss hot topics, including cyber threats that are top concerns for businesses and why you want to keep an eye out for them, how easily bank employees’ emails are compromised, and how to be proactive with your security.
Takeaways:
—Why you should invest in password managers for both business and personal.
—Importance of regular tabletop exercises with technical and nontechnical teams.
—How to create a cybersecurity culture across the entire organization. -
From Chaos to Cyber Compliance: Cyber Requirements for Businesses
Mark Sangster, Chief of Strategy, Adlumin; Wayne Hunter, CEO, AvTek Solutions, Inc.
PART 2: From Chaos to Cyber Compliance Webinar Series
This webinar series explores the following:
Risks associated with mobile and cloud computing – and three critical policies, procedures, and protections every business must implement to protect itself. Overlooking just one of these leaves your organization vulnerable to security breaches, damaging and expensive litigation, and exposing confidential company information to competitors, hackers, and cybercriminals.
Truths about bank fraud, which are unknown to most businesses, and how they could (literally) wipe out your bank account.
Why firewalls and anti-virus software give you a false sense of security.
What it takes to protect your organization against emerging threats and sophisticated cybercrime rings.
-
From Chaos to Cyber Compliance: How to Solve and Maintain your Cyber Compliance
Mark Sangster, Chief of Strategy, Adlumin; Wayne Hunter, CEO, AvTek Solutions, Inc.
This webinar series explores the following:
1. Risks associated with mobile and cloud computing – and three critical policies, procedures, and protections every business must implement to protect themselves. Overlooking just one of these leaves your organization vulnerable to security breaches, damaging and expensive litigation, and exposing confidential company information to competitors, hackers, and cybercriminals.
2. Truths about bank fraud, which are unknown to most businesses, and how they could (literally) wipe out your bank account.
3. Why firewalls and anti-virus software give you a false sense of security.
4. What it takes to protect your organization against emerging threats and sophisticated cybercrime rings.
-
Local-Level Threats: Cybersecurity Strategies for Regional Businesses
Dave Gruber, ESG; Mark Sangster, Adlumin
Securing your infrastructure is a challenge for any kind of business in 2023. Between the uncertainty of the current economic landscape and the difficulty of maintaining on-premise and cloud hybrid environments, cybersecurity teams have to factor in a lot of moving parts. For regional businesses, the problems are often exacerbated by less-developed security strategies, limited resources — and a higher volume of cyberattacks. To protect against these digital threats, it’s critical for regional organizations to explore the right cybersecurity solution for their specific needs.
What works for an enterprise-scale business is not always what’s best for regional companies. An effective security strategy requires skilled staff, financially accessible technology, and the appropriate architecture for your operations. For many organizations, turning to MDR solutions is the most efficient use of resources and the most effective way to secure your data. Identifying the right MDR vendor is therefore one of the most important components of your cybersecurity strategy.
In this webinar from Adlumin and ESG, industry experts will uncover what threats regional businesses should be paying attention to and outline how to find the right MDR vendor for your architecture.
Tune in to hear more about:
— The unique security challenges that plague regional-level organizations
— How to conduct an internal security audit and pinpoint your MDR needs
— The Adlumin platform and the importance of transparency, SOC and live reporting
— And much more -
Beauty Is in the Eye of the Deceiver
Mark Sangster, Vice President, Chief of Strategy, Adlumin and Kevin O’Connor, Director of Threat Research, Adlumin
Deception Technology for Your Zero-Trust Arsenal
Traditional security measures are no longer enough to keep up with the increase in sophisticated cyber threats. Join Adlumin's experts as they discuss zero trust and complementing detection and response capabilities with deception technology. Deception provides not only early-warning detection but insight into criminal tactics and techniques. This threat intelligence is critical to protecting your business.
Join Mark Sangster, Adlumin's Vice President, Chief of Strategy, and Kevin O'Connor to learn:
- An understanding of how zero trust applies to cyber risk management
- How to use deception technologies to detect threats quickly and gain threat intelligence into criminal tactics and techniques
- Ways to complement detection and response capabilities with deception technologies to strengthen your security posture -
Learning from Your Adversary: An Inside Analysis of the Latest Cyber Threats
Mark Sangster, Chief of Strategy at Adlumin and Kevin O’Connor, Director of Threat Research at Adlumin
Understanding which industries criminals target, how they exploit their victims, and why they prefer these organizations is key to protecting your business or operations. Join Adlumin experts as they look inside the latest threats, criminal tactics, and techniques and reverse engineer defensive measures organizations can take to protect themselves from top-tier ransomware gangs and state-sponsored hackers.
-
Cyber-Resiliency for Government Agencies of all Sizes
Mark Sangster -Vice President, Chief of Strategy, Adlumin Inc. and Deb Snyder -Senior Fellow, Center for Digital Government
Government agencies of all sizes face increased pressure to safeguard data, protect mission-critical operations and stay compliant, but doing so can be particularly challenging for smaller agencies.
While many larger organizations have the resources to handle cybersecurity operations, smaller agencies are often constrained in their ability to address critical security needs. Municipalities, localities and smaller cities and states all work with a vast amount of sensitive data that can be of value for cybercriminals, yet often aren’t equipped with the tools necessary to take command of security and compliance.
Join Government Technology to learn proven methods to reduce cybersecurity risk, regardless of agency size or location. As a participant in this webinar, you’ll learn how to:
- Detect and respond to cyber threats with limited in-house security
- Minimize cybersecurity vulnerabilities
- Automate compliance reporting -
Enterprise Strategy Group’s ransomware survival guide
Mark Sangster, Chief of Strategy, Adlumin & Dave Gruber, Principal Analyst, ESG
According to Enterprise Strategy Group’s independent research, 79% of today’s organizations have experienced a ransomware attack in the past 12 months. The hard truth is, many businesses think they’re prepared – that is, until ransomware actually strikes.
In this session, ESG Principal Analyst Dave Gruber presents essential threat intelligence and actionable insights based on his extensive field experience regarding the top ransomware trends today and best practices for surviving an attack. Topics covered inside include:
• Ransomware by-the-numbers: ESG’s most pressing threat statistics
• Critical decision points during an attack (and why they matter)
• ESG’s unbiased advice for achieving a winning ransomware defense strategy
• And much more. -
Selling the Benefits of a SOC: Explaining AI to Business Leaders
Mark Sangster, VP, Chief of Strategy, Adlumin
As a cybersecurity professional, you understand the benefits of a Security Operations Center (SOC), but translating the need to your business leaders can be daunting, especially when it comes to AI. ChatGPT, hyped-up marketing and general confusion about AI and machine learning compound the problem. Join Adlumin expert Mark Sangser, VP, Chief of Strategy, as he explores these topics and masters the translation from the ones and zeroes of security to the dollars and cents with which non-technical business leaders are fluent:
- How proactive security programs reduce risk and improve business outcomes in the face of cyber threats
- Why full visibility across your organization is critical to stopping threats in their early stages
- How AI and machine learning accelerate response times and empower security teams to contain threatsLastly, Mark will evaluate various security solutions and provide a structured means of explaining capability and benefits to your business leaders.
-
Cybersecurity Strategies for Healthcare Organizations: A Fireside Chat
Mark Sangster, VP, Adlumin, John Gaede, Director of Info Services at Sky Lakes Medical, Mike Perryman, Manager of Tech System
A Fireside Chat with Adlumin and Sky Lakes Medical
Join us for an engaging webinar, "Cybersecurity Strategies for Healthcare Organizations.” In this exclusive session, we will provide an overview of Sky Lakes Medical's unique security challenges, focusing on three key areas: Security Challenges, Operational Challenges, and Customer Experience. Together, we will examine the evolving threat landscape and discuss effective strategies to safeguard healthcare organizations from cyber threats.
Don't miss this opportunity to learn from the experts and gain actionable knowledge that can enhance your organization's cybersecurity posture.
-
5 Cybersecurity Best Practices to Impress Business Leaders
Mark Sangster, VP, Chief of Strategy, Adlumin
A cybersecurity journey is not a sprint – it’s a marathon filled with obstacles set up by cybercriminals angling to extort your organization. Just like preparing for a marathon, there are small changes participants make when training that you, a cybersecurity professional, can draw on to strengthen your security and impress business leaders.
Join Mark Sangster for a cybersecurity boot camp where he’ll review the top 5 security tactics that you can implement today. From there, he’ll explore utilizing a Security Operations Center (SOC) to find and remediate threats in just 90 minutes.
-
Decoding PowerDrop Vulnerability: AI and ML in Adlumin's Threat Hunting
Kevin O’Connor, Director of Threat Research at Adlumin
In the ever-evolving landscape of cybersecurity threats, organizations face the constant challenge of detecting and mitigating sophisticated attacks in a timely manner. Implementing automation and machine learning into a threat hunting strategy is key, but what does that look like in practice?
Join Kevin O'Connor, Adlumin’s Director of Threat Research, as he demonstrates how his team discovered and remediated PowerDrop, an insidious PowerShell script for command and control attacks targeting the U.S. aerospace defense industry.
During Kevin’s live demo, you will learn:
- How Adlumin's Threat Research Team used Artificial Intelligence (AI) and Machine Learning (ML) to detect and remediate PowerDrop
- Daily threat hunting methodologies employed by O'Connor and his team
- Exploring the advantages of AI and ML in the field of threat huntingAs a thank you for joining our webinar, we’ll send you our new overview guide, The Executive’s Overview to Proactive Cybersecurity: Harnessing the Power of Security Operations. Additionally – one lucky participant will receive a $200 Amazon gift card.
-
The ABCs of Cyber: Assets, Budget, and Consolidation
Mark Sangster, VP Chief of Strategy, Adlumin and Dave Gruber, Principal Analyst with Enterprise Strategy Group
The boom of cyberattacks and echoes of responding to regulatory and state legislature outpace the resources, from both a budgetary and personnel standpoint, available to small to medium organizations. So, how can they keep up the pace against today’s rising tide of threats?
Join cyber experts Mark Sangster, VP at Adlumin, and Dave Grubber, Principal Analyst at Enterprise Strategy Group (ESG), as they outline a rapid roadmap to successful cybersecurity using consolidation to drive efficiency and manage cost. You’ll walk away from the session having learned the following:
- What are network protection must-haves?
- How to navigate compliance
- Best practices for streamlining your security operations using AI/ML
- How to thoughtfully approach your cybersecurity budget and make the most of every dollar.As a thank you for joining our webinar, we’ll send you our new overview guide, The Executive’s Guide to Cybersecurity. Additionally – one lucky participant will receive a $200 Amazon gift card.
-
Four Seasons In One Day: Protect Your Org during Back to School
Mark Sangster, VP Chief of Strategy
As we enter a seasonal inflection of back to school, criminals will use this time of change to exploit your personal and organizational accounts. Join experts as they prepare you for the season and map out a training plan to empower your people and ensure criminals get an "F" this year.
You’ll walk away from the session understanding how to:
- Use risk management data and accurate phishing lures to build comprehensive awareness training
- Maximize your resources and programs to increase return on investment
- Conduct testing that improves resilience
- Meet regulatory requirements and demonstrate program success to your leadershipAs a thank you for joining our webinar, we’ll send you Mark Sangster's white paper, The Importance of Proactive Security. Additionally – one lucky participant will receive a $200 Amazon gift card.
-
Five Strategies to Mature Security Posture
Mark Sangster, Chief of Strategy at Adlumin and Kevin O’Connor, Director of Threat Research at Adlumin
October marks Cybersecurity Awareness Month. While there are many resources to help your organization and its employees stay secure, are they enough? Join cybersecurity expert and Vice President Mark Sangster and Director of Threat Research Kevin O’Connor as they take you through the top five strategies to grow your organization’s security program based on original research from our latest threat report.
During the session, you’ll learn how to grow your cybersecurity program by learning how to:
• Take your proactive defense to the next level with MFA.
• Implement SOAR to halt attacker activity
• Prioritize patching to limit vulnerabilities
• Grow and scale your security awareness training
• Identify internal threatsAs a thank you for joining our webinar, we’ll send you our latest threat report, which upon download, will enter you into our Cybersecurity Awareness Month contest. Additionally – one lucky participant will receive a $200 Amazon gift card.
Finally, we would like to thank our partner, Ardham Technologies, for sponsoring our webinar.
-
Protecting Education: Addressing the Escalating Cyber Challenges
Mark Sangster, Adlumin VP of Strategy and Coree Kelly, Regional Information Security Officer, High Desert ESD
In an era of escalating cyber threats making headlines, it's paramount for educational institutions to fortify their defenses. By reducing vulnerabilities and improving their ability to detect suspicious activities, these institutions can mitigate the risk of devastating cyberattacks.
Join us for an enlightening discussion featuring cybersecurity expert Mark Sangster, Adlumin's Chief of Strategy, and Coree Kelly, Regional Information Security Officer of High Desert Education School District. Together, they will take you beyond the news stories and deep into the ever-evolving landscape of cyber threats.
This discussion will cover:
- Emerging trends in cyberattacks.
- A clear and actionable 5-step process for assessing risks and safeguarding investments against disruptive cyberattacks.
-The five critical questions to consider when evaluating an investment manager or fund.Join us as we equip educational institutions with the knowledge and tools needed to protect their future against cyber threats.
-
Your Recipe for the Perfect MDR Cybersecurity Strategy
Join Mark Sangster, VP, Chief of Strategy at Adlumin and John Bruggeman, Consulting CISO
Managing a cybersecurity program in the mid-market is as challenging as trying to cook Thanksgiving dinner all by yourself. Carving the turkey while mashing the potatoes and roasting the brussels sprouts is impossible to do at the same time. Imagine if you had an extra set of hands or two to consolidate and automate tasks.
Join Mark Sangster, VP, Chief of Strategy at Adlumin, and John Bruggeman, Consulting CISO, as they break down the perfect recipe for advanced technologies in support of detection and response. The pair will cover:
• The benefits of a Managed Detection and Response solution
• Adding threat intelligence to your security strategy
• Ransomware threats and how to combat them
• Keeping incident response in your back pocketAs a thank you for joining our webinar, we’ll send you Three Critical Elements for the Perfect Security Operations Mix White Paper! Additionally – one lucky participant will receive a $200 Amazon gift card.
-
Naughty List Review: Counting Down the Top 10 Cybersecurity Incidents of 2023
Mark Sangster, Vice President, Chief of Strategy, and Kevin O'Connor, Director of Threat Research
How expansive is the 2023 security naughty list? Join cybersecurity expert and vice president Mark Sangster and director of threat research Kevin O’Connor as they countdown the top cybersecurity events of 2023, including the PowerDrop vulnerability discovered by Adlumin’s threat research team, and Playcrypt Ransomware Gang.
What you will learn?
- Lessons learned about PlayCrypt Ransomware Gang (definitely on the naughty list)
- How Adlumin discovered and remediated PowerDrop
- How to give a boost to your EDR and NGAVAs a thank you for joining our webinar, we’ll send you the Winter Threat Report. Additionally – one lucky participant will receive a $200 Amazon gift card.
-
Revolutionizing Cybersecurity: The AI Advantage
Mark Sangster, Chief of Strategy at Adlumin
Artificial Intelligence (AI) isn’t new, but learning how we can harness it is constantly evolving. Explore the cybersecurity transformation with our upcoming webinar, where we uncover the adoption of AI in cybersecurity products. Hear how security providers embrace AI to fortify their defenses and elevate analyst capabilities.
During this session, you will learn:
• How the surge in machine learning usage is reshaping cybersecurity
• Ways to incorporate AI across detection, investigation, and incident response strategies
• Why the incorporation of a human element is still required when applying AIAs a thank you for joining our webinar, we’ll send you Gartner® “Emerging Tech: Top Use Cases for AI in Threat Detection, Investigation, and Response.
Additionally – one lucky participant will receive a $200 Amazon gift card for attending.*
*The attendee will be notified by email after the session.
Gartner, Emerging Tech: Top Use Cases for AI in Threat Detection, Investigation and Response, Travis Lee, Matt Milone, Elizabeth Kim, John Collins, 27 October 2023.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. -
How to use Network Visibility in Your Cybersecurity Strategy
Mark Sangster, Vice President, Chief of Strategy at Adlumin
Don’t let a “Black Hole of Visibility” Form in Your Network
As organizations grow in size and complexity, their internal networks often become a “black hole” in terms of visibility. To keep these networks secure, this visibility needs to be managed, but time and budget seldom allow IT and cybersecurity professionals to gain actionable insights. Join Adlumin’s Vice President, Chief of Strategy, Mark Sangster as he demystifies network visibility and provides valuable takeaways you can implement today to mature your cybersecurity posture.
During the webinar, you will learn:
- Why going beyond Endpoint Security and basic integrations is critical for network integrity
- How to empower your team with automation and AI to defend against ransomware and other cyberattacks
- How to simplify cyber-threat visibility to make it accessible for SMBsAs a thank you for joining our webinar, you’ll receive our “Three Critical Elements for the Perfect Security Operations Mix” White Paper, with key takeaways and recommendations for your cybersecurity strategy. Additionally, one lucky participant will receive a $200 Amazon gift card.
-
Watch a Live EvilGinx Demonstration to See How Cybercriminals Bypass MFA
Mark Sangster, Vice President, Chief of Strategy, and Kevin O'Connor, Director of Threat Research
Cybersecurity professionals preach the power of multi-factor authentication (MFA), but what happens when a cybercriminal goes around it?
Join Adlumin’s Mark Sangster and Kevin O’Connor as they demonstrate MFA bypass techniques using EvilGinx 3. In this webinar, you’ll also see how attackers can leverage hijacked session cookies and EvilGinx phishlets to compromise user accounts and access. The pair will also dive into how to combat these attacks, along with the benefits of a fully visible network for cybersecurity.
As a thank you for joining our webinar, you’ll receive “The Executive’s Guide to Cybersecurity,” that includes key takeaways and recommendations for your cybersecurity strategy. Additionally, one lucky participant will receive a $200 Amazon gift card.
-
Highlights from the New Threat Insights 2024 Volume I Report
Mark Sangster, Vice President, Chief of Strategy, and Kevin O'Connor, Director of Threat Research
Explore the latest ransomware cyber-threat trends in this new research from the Adlumin Threat Research Team
The Adlumin Threat Research Team has been dedicated to tracking and analyzing the most important cybersecurity trends, including ransomware. Keeping up to date with these threats can make the difference between a minor event and an operational shutdown.
Join Kevin O’Connor, Director of Threat Research, and our host, Mark Sangster, VP, Chief of Strategy at Adlumin as the pair reviews significant takeaways, trends, and vulnerabilities in the new Threat Insights 2024 Volume I report.
In this webinar, you’ll receive:
• Exclusive Insights from Adlumin’s Threat Insights 2024 Volume I report
• Detailed Analysis of Emerging threat trends in cybersecurity, including the latest in ransomware attacks
• Strategies to implement Proactive Vulnerability Management in your cybersecurity strategyAs a thank you for joining our webinar, we’ll send you our new Threat Insights 2024 Volume I report. Additionally, one lucky participant will receive a $200 Amazon gift card.
-
Outsmarting the Adversaries: How AI is Transforming Threat Detection & Response
Mark Sangster, VP, Chief of Strategy and Ben McPherson, Head of Solutions Engineering
This webinar will explore how artificial intelligence (AI) is being used to revolutionize data security. Industry experts Mark Sangster, VP, Chief of Strategy, and Ben McPherson, Head of Solutions Engineering, will discuss how AI is addressing emerging threats in the cybersecurity landscape and Managed Detection and Response (MDR) space.
In this webinar, you’ll learn:
- How AI can analyze vast amounts of data to identify and predict security threats.
- Different ways AI can be used to detect unusual user activity that might indicate a security breach.
-Methods for how AI can be used to scan networks and systems for vulnerabilities.As a thank you for joining our webinar, you’ll receive “The Ultimate Guide to Using Cybersecurity AI,” which includes key takeaways and recommendations for your security strategy. Additionally, one lucky participant will receive a $200 Amazon gift card.
-
How to Choose an MDR Provider. Five Questions You Need to Ask.
Mark Sangster, VP, Chief of Strategy
Decode cybersecurity jargon with Mark Sangster and make an informed decision when evaluating cybersecurity solutions.
The cybersecurity marketplace is vast and full of acronyms. Just knowing where to start, what kind of security to research, and which cybersecurity vendor to go with takes an enormous amount of time.
Join Mark Sangster, VP, Chief of Strategy, as he breaks down and simplifies the Managed Detection and Response (MDR) market. Mark will also discuss takeaways from Adlumin’s MDR buyer guide to help buyers make an informed decision.
In this webinar, you’ll learn how to:
- Understand the cybersecurity marketplace and the questions to ask when starting your search
- Evaluate what type of security solutions work best for your organization and how to meet compliance challenges
- Evaluate MDR companies and ask the right questions before taking any next stepsAs a thank you for joining our webinar, we’ll send you our MDR Buyer’s Guide. Additionally, one lucky participant will receive a $200 Amazon gift card.
-
Real-World Applications for Better Security: Adlumin’s Threat Research Insights
Mark Sangster, VP and Chief of Strategy
Organizations constantly face evolving cyber threats, and staying ahead requires more than just awareness—it demands actionable strategies to defend against adversaries. Join Mark Sangster, VP and Chief of Strategy, as he delves into Adlumin’s latest threat research and shares real-life examples of how to apply these insights to strengthen your own defenses.
Why You Can't-Miss This Webinar:
· Sneak Peek: Learn more about Adlumin’s ransomware ransomware prevention capabilities used to thwart cybercriminals’ attacks.
· Actionable Intelligence: Discover how to convert threat research into practical defense measures for your organization.
· Tailored Solutions: Learn specific strategies for protecting against ransomware based on Adlumin’s threat research and Mark Sangster’s upcoming book.As a thank you for joining our webinar, we’ll send you the new Cyber Threat Insights 2024 Volume II report.
-
Real Life Stories of Ransomware and Recovery
Mark Sangster, VP and Chief of Strategy
Ransomware continues to make headlines as attacks impact various industries including healthcare, education, and, more recently, car dealerships. As cybercriminals expand their targets, organizations need to consider not only how to prevent ransomware but also how to mitigate it when an attack happens.
Join Mark Sangster, VP, Chief of Strategy, as he breaks down real-world cybercrime examples from his upcoming book Cyber-Conscious Leadership: A Practical Guide to Protecting Your Organization Against Cyber Crime. Additionally, Sangster will explore Adlumin’s new ransomware feature.
Watch to:
- Understand ransomware’s lifecycle and what methods cybercriminals use to infiltrate an organization
- Evaluate real-world examples from Sangster’s anticipated second book
- Implement strategies to teach your employees how to spot ransomware techniquesAs a thank you for joining the webinar, we’ll share our Threat Insights 2024 Volume II with all attendees during the session.
-
Defending Against Fog Threat Actors— How Adlumin Stopped a Ransomware Attack in Its Tracks
Kevin O’Connor, Director of Threat Reseach, and Will Ledesma, Senior MDR Director
"Fog," a variant of the STOP/DJVU ransomware family, exploits compromised VPN credentials to breach defenses. In August 2024, a mid-sized financial institution became the first in its sector to be targeted by this variant, but Adlumin’s technology isolated and locked the attackers out.
Join Adlumin experts, Kevin O’Connor, Director of Threat Research, and Will Ledesma, Senior Managed Detection and Response Director, as they walk you through the details of the recent attack, and how Adlumin’s Ransomware Prevention and Exfiltration feature thwarted the attack in its early stages, containing the threat before it could cause any damage.
Key Takeaways:
- An overview of international FOG threat actors and their evolving tactics
- A step-by-step breakdown of the data breach attempt and how Adlumin’s Ransomware Prevention stopped the attack
- Best practices for strengthening your organization's defense against similar threats from cross-border cyber attacksWhether you're a cybersecurity professional or an IT leader, this webinar will provide valuable insights and actionable strategies to keep your organization from the ever-present threat of global Fog threat actors.