All episodes
-
The Modern Kill Chain: How Attacks Have Gone From Months to Minutes
Aaron Cockerill, EVP Product, Lookout, Inc
Cloud breaches are now happening in minutes, not months. Threat actors are exploiting the fact that mobile devices are more susceptible to social engineering, enabling them to gain direct access to cloud infrastructure and swiftly compromise data.
Join us for this 30-minute webinar with Lookout EVP of Product to learn:
- How the traditional cyber kill chain has evolved to exploit mobile users
- Why attacks utilizing a mobile device are increasing
- What makes your organization vulnerable to a modern-day attack
- Why stopping breaches requires the ability to identify anomalous data movements
- The three key capabilities you need to defend against modern breaches -
How Lookout Protects Against the Modern Day Kill Chain
Dan Feller, Principal Technical Marketing Manager, Lookout
Cybercriminals continue to evolve their tactics to compromise your organization's security defenses. The modern approach is to start by targeting users on their mobile devices to steal their credentials.
Learn how these cybercriminals have evolved their tactics, and how Lookout prevents and protects at each stage of the kill chain.
For more information, visit: www.lookout.com
-
Understanding the Modern Kill Chain: Analyzing Scattered Spider & APT41
Ken Saganowski, Director of Technical Advisory at MOXFIVE, Tyler Croak, Principal Strategist at Lookout
Scattered Spider: The cybercrime group behind the MGM Resorts data breach costing an estimated $100 million.
APT41: A notorious Chinese APT that recently developed two mobile surveillanceware tools, WyrmSpy and DragonEgg, to target over 100 public and private sector organizations.These two groups represent a global shift among threat actors – focusing on mobile devices to quietly compromise credentials, apps, and data. Join Tyler Croak, Principal Strategist at Lookout, and Ken Saganowski, Director of Technical Advisory at MOXFIVE, in this 30-minute session, to learn:
- How the traditional kill chain has evolved
- What modern tactics are being used to trick your users
- What happens after an attacker gains access - A real-life Scattered Spider example
- How to detect an intruder in your system
- What immediate actions you can take today to protect data in 2024