Malware in Disguise & How to Spot It

Malware in Disguise & How to Spot It

On the surface, spotting malicious attacks can be difficult. Hackers are expanding their malware distribution networks by exploiting commonly used applications to carry and distribute their malicious software. In the wake of the three major attacks Wanna Cry, DocuSign, and Google Docs malware outbreak we will examine how malware is distributed and provide guidelines on how to secure infrastructures against the next attack.

Alex Holden | 05, 24 2017 | 56 min
Travel & Loyalty Reward Program Vulnerabilities

Travel & Loyalty Reward Program Vulnerabilities

Join this webinar to learn the top 10 vulnerabilities within your travel and loyalty reward program abused by hackers. What do hackers see as an easy profit? Learn what to do to defend your customers’ benefits.

Alex Holden | 05, 11 2017 | 42 min
WikiLeaks Vault7 Impact

WikiLeaks Vault7 Impact

Are we really surprised about the current revelations behind WikiLeaks Vault7? It confirms that the US government has secret hacking tools like everyone else. Are they the only ones who have these tools? We will discuss the Dark Web hackers and the government-sponsored hacking advances. Most importantly, how does it impact our privacy at home and within our companies. What do we need to do to stop this type of unwarranted exploitation?

Alex Holden | 03, 21 2017 | 57 min
The State of Cybersecurity in 2017

The State of Cybersecurity in 2017

Join us in discussing the state of cyber security in 2017. What are current threats, pitfalls, and the myths hindering our defenses. Learn advanced techniques of defending your enterprise security and making it an undesirable target.

Alex Holden | 02, 23 2017 | 59 min
Stolen Credentials – #1 Cyber Threat Today

Stolen Credentials – #1 Cyber Threat Today

Over the past several years Hold Security has seen hackers traffic 5 BILLION unique, unencrypted stolen credentials on the Dark Web. Hackers use some of these credentials to breach the most trusted systems and commit the most heinous cybercrimes. Join us to learn about the process of recovering stolen credentials from the hackers and alerting the victims.

Alex Holden | 02, 07 2017 | 60 min
What Did Russians Really Hack?

What Did Russians Really Hack?

Almost every news story about cyber security today starts with “the Russians did it!” Did the Russians hack the US elections? Do they regularly steal our data? Who is behind of all the hacking? We will take an insider look at the Russian hackers and try to delineate their ill gains and techniques. Most importantly, what will they do next?

Alex Holden | 01, 18 2017 | 58 min
Yahoo! Breaches Continue – What to Expect Next from Yahoo

Yahoo! Breaches Continue – What to Expect Next from Yahoo

Yahoo closed 2016 with another revelation about their poor state of security. This time they admitted of losing all their user credentials in 2013. Adding to Hold Security’s previous intelligence from the 2014 breach, Alex Holden, CISO will discuss exclusive details about situation with Yahoo. Yahoo! Breaches Continue – What to Expect Next from Yahoo

Alex Holden | 01, 03 2017 | 46 min
4 5 6

Logo
Řešení Threat Intelligence Services Credential Integrity Service Domain Integrity Service Služby posuzování informační bezpečnosti Reakce na incident a vyšetřování
Telefon
+420 770 121 812
Email
info@hstechnology.cz
Sociální sítě
twitter linkedin
Naše kanceláře
Autorská práva © 2024 Hold Security