Download Log360

The
cybersecurity diar es

A series on cyberattacks

Watch now
 

About the series

Cyberattacks on businesses don't seem to be slowing down any time soon. So what are the key takeaways from these attacks we can all learn from? What industries are the most affected? And is it possible to protect your organization from these attacks?

Human beings learn best through experience. When it comes to cybersecurity, this is no different. It is important to rely on the knowledge of real-world examples of cyberattacks in order to defend against future threats and ensure complete cybersecurity.

Follow this series to stay on top of everything happening in the cyber world, and learn how to secure your network perimeters against sophisticated threat actors.

In this cyberattack series, we will:

  • Explore recent cyberattacks.
  • Learn how an attack is carried out by threat actors.
  • Dissect the attack stages to get an inside perspective.
  • Identify what security events need to be looked at.
  • Discuss how a SIEM solution like Log360 can detect and mitigate attacks.

Episodes

  • Episode 1
  • Episode 2
  • Episode 3
  • Episode 4
  • Episode 5

REvil ransomware attack:

  • REvil is a ransomware-as-a-service (RaaS) operation. This highly configurable ransomware has been linked to GOLD SOUTHFIELD, a financially motivated threat group.
  • The ransomware enters your network by exploiting servers or through phishing links, performs lateral movement and starts encrypting files. Then, it exfiltrates the encrypted data over its command and control channel.
  • REvil's attack happens in stages and they can be detected using a SIEM solution like Log360 that detects security threats by implementing the MITRE ATT&CK framework.
 
presented by

Esther

Cybersecurity specialist

Watch now

Social engineering attacks and how to spot them

  • Different types of social engineering attacks
  • Real-world examples of organizations that fell victim to this type of attack
  • The telltale signs of social engineering attacks
  • How you can prevent social engineering attacks in your organization
 
presented by

Esther

Cybersecurity specialist

Watch now
 
Coming soon...

Stay tuned

 
Coming soon...

Stay tuned

 
Coming soon...

Stay tuned

×

Thank you for registering!


home

About

Sessions