Live Webinar July 18: Harnessing Exposed Data to Enhance Cyber Intelligence

Attack methods repeat themselves, and so does how cybercriminals use breached data, such as PII, stolen account details and even compromised admin credentials. Once data is compromised, it can circulate and recirculate on the dark web for years, and be packaged and repackaged for crime, cyber espionage and fraud. Understanding how breached data is used, whether it be to create synthetic identities, take over bank accounts or perpetrate credit card fraud, to name a few, can play a big role in threat-intelligence, too.

 

Register Here

SESSION OVERVIEW:

  • Understand how the use of breached data can support threat intelligence
  • Review breached data that attackers may use again
  • Discuss common TTPs that attackers use when repurposing breached data for new attacks

 

 

Register Here

Previous Post
ShadowTalk Update – Google Calendar Phishing, Exim Email Server Vulnerability, and Diversity in Cybersecurity
ShadowTalk Update – Google Calendar Phishing, Exim Email Server Vulnerability, and Diversity in Cybersecurity

This week Alex and Jamie chat with Harrison on a cyber-threat campaign involving the abuse of legitimate fe...

Next Post
Live Webinar June 27: Best Practices Mitigating Risks to Data in Complex IT Ecosystems
Live Webinar June 27: Best Practices Mitigating Risks to Data in Complex IT Ecosystems

Learn how complex enterprises rely on third party systems, networks and service providers and the associate...

×

150k+ subscribers stay ahead of digital risks.

- Join Them -

Sign up for threat intel and security news updates here:

First Name
Last Name
Company
Country
State- optional
Job Title
Thank you!
Error - something went wrong!