Download Log360

cybersecurity diar es

A series on cyberattacks

Watch now

About the series

Cyberattacks on businesses don't seem to be slowing down any time soon. So what are the key takeaways from these attacks we can all learn from? What industries are the most affected? And is it possible to protect your organization from these attacks?

Human beings learn best through experience. When it comes to cybersecurity, this is no different. It is important to rely on the knowledge of real-world examples of cyberattacks in order to defend against future threats and ensure complete cybersecurity.

Follow this series to stay on top of everything happening in the cyber world, and learn how to secure your network perimeters against sophisticated threat actors.

In this cyberattack series, we will:

  • Explore recent cyberattacks.
  • Learn how an attack is carried out by threat actors.
  • Dissect the attack stages to get an inside perspective.
  • Identify what security events need to be looked at.
  • Discuss how a SIEM solution like Log360 can detect and mitigate attacks.


  • Episode 1
  • Episode 2
  • Episode 3
  • Episode 4
  • Episode 5

REvil ransomware attack:

  • REvil is a ransomware-as-a-service (RaaS) operation. This highly configurable ransomware has been linked to GOLD SOUTHFIELD, a financially motivated threat group.
  • The ransomware enters your network by exploiting servers or through phishing links, performs lateral movement and starts encrypting files. Then, it exfiltrates the encrypted data over its command and control channel.
  • REvil's attack happens in stages and they can be detected using a SIEM solution like Log360 that detects security threats by implementing the MITRE ATT&CK framework.
presented by


Cybersecurity specialist

Aug 25 at 3 PM BST (2 PM GMT)

Watch now
Coming soon...

Stay tuned

Coming soon...

Stay tuned

Coming soon...

Stay tuned

Coming soon...

Stay tuned


Thank you for registering!