Featured
Inside the Threat: Secureworks CTU Analysis | Episode 4: LockBit Disruption Update
Tim Mitchell, Senior Security Researcher, Secureworks
Secureworks® CTU™ experts provide an update on Operation CRONOS, the ongoing law enforcement disruption of one of the largest and most prolific ransomware groups of recent years, LockBit. This webinar will build on the detail provided in Episode 1 of Inside the Threat by discussing the most recent law enforcement action which uncovered links between LockBit and notorious Russian cybercriminal group, EvilCorp.
CTU researchers will also look at the impact of this latest phase of Operation CRONOS on both the operators of LockBit and the wider ransomware ecosystem, providing practical advice for safeguarding your organization from ransomware.
In this informational webinar, you will:
-- Gain insights into the latest developments in the ongoing disruption of LockBit and the newly discovered links to EvilCorp.
-- Discover how continued law enforcement activity has impacted the wider ransomware ecosystem and what this means for the threat landscape.
-- Learn how to protect your organization from ransomware attacks.
All episodes
-
Inside the Threat: Secureworks CTU Analysis | Episode 1: Unpicking LockBit
Tim Mitchell, Security Researcher, Counter Threat Unit at Secureworks
Join Secureworks® Counter Threat Unit™ (CTU) for an expert overview of the LockBit ransomware group, the largest and longest-standing group responsible for ransomware attacks, and the recent takedown.
CTU researchers will deliver insights into the tradecraft of affiliates of LockBit’s ransomware-as-a-service gained from numerous investigations conducted over several years, with intimate details of the recent law enforcement takedown of LockBit and the impact of that action for organizations.
IN THIS INFORMATIONAL WEBINAR, YOU WILL LEARN:
- A brief history of LockBit and how they evolved into the largest ransomware group
- The disruptive action taken by international law enforcement agencies against LockBit and the significance of this takedown
- How to remain vigilant in protecting your organization against ransomware and other forms of cyber attacks -
Inside the Threat: Secureworks CTU Analysis | Ep. 2: Dissecting the Deepfakes
Rafe Pilling, Director of Threat Intelligence, CTU Threat Research and Ben Jacob, EMEA Technical Lead – Adversary Group
The rapid advancement of Generative AI is fueling an equally rapid evolution of deepfake technology. From effortlessly cloning voices to generating convincing replicas of individuals' faces, deepfakes are enabling the creation of deceitful material with unprecedented accuracy. Exploited by threat actors, these tools can lead to significant financial fraud by usurping identities of high executives.
Join Secureworks® CTU™ experts as they discuss the world of deepfakes, from face swapping and avatars to more sophisticated uses of social engineering that could lure an unsuspecting employee into releasing sensitive information. We’ll cover the details you need to pay attention to so you can spot a deepfake and techniques you can implement at your organization to protect against these types of attacks.
This informational webinar will cover:
· The cutting-edge AI tools enabling the creation of realistic deepfakes
· Real-world deepfake attacks causing financial fraud
· Effective strategies to defend your organization against deepfake threats -
Inside the Threat: Secureworks CTU Analysis | Episode 3: Understanding AitM Tactics and Credential Theft
Rafe Pilling, Director of Threat Intelligence, CTU Threat Research, Secureworks
Join Secureworks® CTU™ experts for an in-depth exploration of "Understanding Adversary in the Middle (AitM) Tactics and Credential Theft," a crucial topic for anyone concerned with protecting remote access solutions or SaaS applications. This webinar will unravel the complexities of AitM attacks, a sophisticated method used by threat actors to intercept and steal user credentials or tokens.
We will delve into the mechanics of these attacks, highlight real-world examples, and examine the tools and technologies employed by attackers. Additionally, we'll discuss effective strategies for detection, prevention, and response, providing practical advice to safeguard your organization. Don't miss this opportunity to enhance your understanding and fortify your defenses against one of the most insidious threats in the digital landscape.
In this informational webinar, you will:
· Gain insights into what AitM attacks are and why you need to watch out for these type of attacks
· Discover the various types of AitM attacks and how they work
· Learn how to protect your organization from AitM attacks -
Inside the Threat: Secureworks CTU Analysis | Episode 4: LockBit Disruption Update
Tim Mitchell, Senior Security Researcher, Secureworks
Secureworks® CTU™ experts provide an update on Operation CRONOS, the ongoing law enforcement disruption of one of the largest and most prolific ransomware groups of recent years, LockBit. This webinar will build on the detail provided in Episode 1 of Inside the Threat by discussing the most recent law enforcement action which uncovered links between LockBit and notorious Russian cybercriminal group, EvilCorp.
CTU researchers will also look at the impact of this latest phase of Operation CRONOS on both the operators of LockBit and the wider ransomware ecosystem, providing practical advice for safeguarding your organization from ransomware.
In this informational webinar, you will:
-- Gain insights into the latest developments in the ongoing disruption of LockBit and the newly discovered links to EvilCorp.
-- Discover how continued law enforcement activity has impacted the wider ransomware ecosystem and what this means for the threat landscape.
-- Learn how to protect your organization from ransomware attacks.