Dissecting Cybercrime – Credentials – (still) keys to your kingdom

Dissecting Cybercrime – Credentials – (still) keys to your kingdom

Many years ago we decided that protecting our data just behind username and password authentication is a bad idea. Yet today, we are still heavily relying only on this technology. And, in turn, cybercriminals rely on stolen credentials to enter our realm to wreak havoc. Let’s take a look at how your credentials are valued today, how they are stolen and abused. Then let’s discuss available safeguards including not only MFA but other viable defenses for our society that still holds on to its P@ssword1!
Alex Holden | 08, 24 2020 | 60 min
...Tweet No Evil

...Tweet No Evil

After the recent Twitter account compromise many questions come into focus about security of our social media and events leading to account takeovers. Our investigations of similar cryptocurrency schemes show a pattern of abuse of people’s trust. However, the current Twitter incident is significantly more than meets the eye. The magnitude and impact do not match the financial gains. Sophistication of the breach of high-profile accounts pales in comparison to a sophomoric monetization scheme.
Alex Holden | 07, 17 2020 | 55 min
Dissecting Cybercrime – Journey of a Stolen Credit Card

Dissecting Cybercrime – Journey of a Stolen Credit Card

We often don’t realize the full impact of cyber crime, which then relapses us into repeating the same mistakes. Even large companies do not completely understand how their data and services are being abused. I want to take you on a journey of observing credit card fraud and abuse from stealing a credit card to trafficking of stolen goods. Learning about these vectors of abuse will help you and your organization to mitigate a number of common attacks and abuses.
Alex Holden | 07, 14 2020 | 62 min
The Future of US Democracy: 2020 Election, Russia, BLM, COVID19 & Social Media

The Future of US Democracy: 2020 Election, Russia, BLM, COVID19 & Social Media

In August 2019, Hold Security ran a table top exercise with Wisconsin Ingragard focusing on potential electronic tampering of the 2020 Wisconsin elections by foreign influences. We leveraged our insights in identifying and reporting Russian interference during the 2016 US election to derive critical lessons. The results were fascinating and scary. In this session, we will focus on the 2020 US election through our unique cybersecurity perspective focusing on current events and technical understanding to analyze use of social media manipulations, civil unrest, disinformation campaigns, cyber attacks, and more.
Alex Holden | 06, 18 2020 | 61 min
Malware in Disguise: The New Normal

Malware in Disguise: The New Normal

Examination of the threats and advances of malware in 2020. New techniques from existing threat groups and emerging trends. Examination of popular botnets, attack techniques, and current defenses.
Alex Holden | 05, 12 2020 | 60 min
Phishing and Hunger for Information – COVID-19 Era

Phishing and Hunger for Information – COVID-19 Era

Today, as we are trying to adjust to the new normal, cyber criminals are rushing to take advantage of our drive towards learning. Phishing using COVID-19 related messages is rising to a new high with not only a number of phishing attacks but with a number of victims who are falling for it. We will discuss the new trends and techniques that you should be implementing within your organization to minimize impact of phishing in this new normal.
Alex Holden | 04, 15 2020 | 58 min
Coronavirus Pandemic – Cyber Intelligence Fighting the Virus in Cyberspace

Coronavirus Pandemic – Cyber Intelligence Fighting the Virus in Cyberspace

In the midst of the Coronavirus pandemic, our society is struggling to adjust to the necessary and unexpected changes. In the information security space, we are prepared for many things, but dealing with a pandemic crisis leaves many unprepared.

Alex Holden | 03, 23 2020 | 61 min
Threat Landscape 2020 – Expect the Unexpected

Threat Landscape 2020 – Expect the Unexpected

Security threats mutate and lately they are becoming more bold than ever. What is driving this pattern? We will examine new patterns in ransomware, phishing, and data exposures that are greatly affecting our security posture as well as provide better guidelines for mitigating these threats.

Alex Holden | 02, 13 2020 | 60 min
Security Mindset – A Journey Toward Better Security

Security Mindset – A Journey Toward Better Security

As our journey towards better security continues, we need to learn from mistakes of the past. We will discuss capitalization on past successful experiences and learn cautionary tales from failures. Secure-by-design is our goal but it cannot be at the expense of user experience or product quality.
Alex Holden | 01, 24 2020 | 58 min
The Art of Stepping on the Same Rake – Nth Edition

The Art of Stepping on the Same Rake – Nth Edition

On the way to maturity, we are to learn from our own mistakes but how well do we do it? Are we also able to learn from mistakes of our peers and our industry? We will examine the common pitfalls and provide actionable advice on improving the information security posture for organization on many levels.
Alex Holden | 11, 14 2019 | 58 min
1 2 3 4 5

Logo
Řešení Threat Intelligence Services Credential Integrity Service Domain Integrity Service Služby posuzování informační bezpečnosti Reakce na incident a vyšetřování
Telefon
+420 770 121 812
Email
info@hstechnology.cz
Sociální sítě
twitter linkedin
Naše kanceláře
Autorská práva © 2024 Hold Security