Check out a Malwarebytes Webinar for more information on exploits and malware and how they work.
The incident response function is arguably the most important part of a healthy security program. Yet, many organizations haven't given much thought to how they’re going to handle a malware outbreak, much less document the steps in a formal incident response plan. In this webinar, independent security expert and writer of 12 books including the highly-successful Hacking For Dummies, Kevin Beaver, shares with you his thoughts and experiences on how malware-related incident response efforts have failed businesses along with what can be done about these gaps and risks.
In 2017, hackers had a huge impact on businesses with major outbreaks of ransomware like WannaCry and NotPetya. Watch the replay of Malwarebytes Labs in our annual look back. Take a deep dive in what threats grabbed not only our attention but the world's attention. And hear our predictions for 2018.
Many people view security products as commodities - choose the tool and check the box. Reality is showing us that security is not that simple. Rather than going with whomever gave the slickest sales presentation or lowest price, selecting the right vendor has to be more methodical given what’s at stake. In this webinar, independent information security consultant, professional speaker, and writer of numerous security books including Hacking For Dummies, Kevin Beaver, will share some common mistakes and oversights he sees people making when procuring security products and services for their businesses. From endpoints, out to the cloud, and everything in between, there are criteria that must be considered and questions that must be asked if the security controls are to be a good fit and effective long term. Join us to find out what you can to do maximize your investment in security technologies up front so you don’t have to revisit things when you realize you went down the wrong path.
In this webinar, we will be go over the New Mafia Report: Guide to Cybercrime for CEOs’ examines the rise of this activity and its ramifications for businesses. Through expert insight, this guide determines that the approach to stop cybercrime must reflect the path once taken to handle notorious gangs: fight back.
Paul Flatters, CEO of Trajectory and Mark Patton, VP Engineering at Malwarebytes
The concept of a layered security defense has been around for millennia. Even since the beginning of IT as we know it, layered controls have made up the most resilient environments. Still, many organizations continue to struggle with this approach to security especially as it relates to malware.
In our fourth Cybercrime Tactics & Techniques webinar, we are going to take a deep look at what threats got our attention the most during the last three months and what we expect to happen moving into the last quarter of 2017. Thus far, the year has brought us outbreaks of ransomware and breaches across the globe, making it more important than ever to implement multi-vector protection.
Key takeaways include:
Speakers: Adam Kujawa and Dana Torgersen
Fighting ransomware is not futile. Like any other security threat, there is a formula to understanding it and protecting against it. Although ransomware’s consequences such as data loss and unknown exposures are serious, managing this threat doesn’t have to be challenging.
In this webinar, independent information security consultant, professional speaker, and writer of numerous security books, including Hacking For Dummies, Kevin Beaver, will share his thoughts and ideas on the best ways to protect your environment – and your data – so that these criminal hackers don’t get their way. It’s simple but it requires discipline. Tune-in to see what you can do to improve your odds of ransomware success and your overall information security program.
Ransomware continues to be a major problem—and the problem is only getting worse. Malwarebytes conducted an exclusive survey with Osterman Research asking 575 organizations worldwide how ransomware is impacting their business. The responses were sobering. Ransomware is a “top three” problem for the organizations, cited by 70 percent of those surveyed. Yet most organizations are not confident in their ability to stop ransomware attacks.
Key takeaways include:
Speakers: Michael Osterman and Dana Torgersen
In our third Cybercrime Tactics & Techniques report we are going to take a deep look at what threats got our attention the most during the last three months of the year and what we expect to happen moving through the next quarter.
Key takeaways include:
Adam Kujawa, Director of Malware Intelligence, has over 12 years of experience fighting malware on the front lines and behind the scenes. Follow Adam on Twitter @kujman5000 to stay up to date on malware intelligence.
Dana Torgersen, Sr. Product Marketing Manager, has over 10 years of InfoSec industry experience. Follow Dana on Twitter @DaToTweet for the latest news about Malwarebytes and other hot topics in cybersecurity.
Businesses have been trusting security vendors to protect their endpoints for years, but those vendors can't keep up with the speed of the evolving threat landscape. They are failing in their promise to protect their customers, and these failures have opened the door for Next-Generation Anti-Virus solutions. Desperate for relief, businesses are adding, or even replacing, their traditional AV with these NGAV solutions. And while the NGAV vendors have promised unbelievable levels of effectiveness, endpoints continue to get infected.
Given today's threat landscape, combined with so many security options available today, it can be daunting when selecting new or alternative technologies to protect your business. Your security team has unique challenges; therefore, you should be asking your next security vendor how they will meet your requirements—both for today, and the future.
Key takeaways include:
David Monahan - Research Director, Enterprise Management Association
Dana Torgersen - SR. Product Marketing Manager, Malwarebytes
Ransomware has been around since the late 1980s but in recent years has become a much more common and disruptive element for network defenders. In this webinar, we will discuss the three types of ransomware (Client-side, Server-side and Hybrid), how to mitigate initial infection and respond to and remediate an infection with appropriate scoping, escalation and lessons learned.
In addition to technical mitigations, we will also incorporate the latest NIST guidance on recovery from destructive attacks (SP800-174), and discuss 'layer 8' strategy to obtain executive support for mitigating and recovering from a ransomware incident, which, unlike low and slow attacks on confidentiality (IP, PII, ePHI), disrupt productivity and uptime, which the business executives certainly care about in a fundamentally different way than data theft.
Gal Shpantzer has over 15 years of experience as an independent security professional.
Ken Liao is the Vice President of Product Marketing at Malwarebytes, with over 15 years of experience in information security.
Even though their processes aren't formal or mature, respondents reported benefits from their hunting practices, including reduce attack surfaces and detection of unknown threats in the enterprise, according to the 2016 SANS Survey on Threat Hunting. In that survey, 74% of respondents who use threat hunting said that hunting for threats reduced their attack surfaces, while 59% cited more accurate response, and 52% found previously undetected threats that were active in their enterprises. This new 2017 survey, publishing in association with the SANS Threat Hunting and Incident Response Summit, further defines how organizations apply threat hunting to enterprise response and detection, while also bringing out new best practices for integration and use of threat-hunting information. During this session, the second in a two-part series, attendees will learn about:
Dana Torgersen is a veteran product marketer who cut his teeth in network and data center security while at Secure Computing, McAfee, Palo Alto Networks, and security startup Illumio. He heads up Product Marketing for Malwarebytes, encouraging individuals and businesses to protect their endpoints against malware and exploit-based threats.
In the quarterly Cybercrime Tactics and Techniques report our Malwarebytes Labs team looks deep into what is dominating the threat landscape. The Labs team specifically saw a significant shift in dominance of new threats and infection techniques in the first quarter of 2017.
Key takeaways include:
The industry is experiencing breach fatigue. Few bat an eye when we hear of the newest enterprise to be breached. Despite this understanding, the reputational and operational damages associated with breaches continue to skyrocket.
In response, enterprises are directing more resources into proactive and reactive controls which we all know don't fix the problem. Today, organizations need to rethink the concept of "protection" and shift focus from security controls to being able to detect and respond in a more agile way.
This webcast will show how enterprises can improve their cyber defensive postures and truly protect them from reputational and operational damage before, during and after an incident.
With new threats showing up on the horizon every day, staying ahead of the curve can seem like a full-time job for IT pros. The best defense is to make sure your security solution is multi-layered.
Key topics include:
In 2016, we finally saw the headlines catch up with the hype. Cyberattacks and cybersecurity, or a lack thereof, grabbed media attention on both the corporate and consumer sides, even becoming a key issue in the US presidential election. In this respect, you could say that everyone, even those who have never logged on, was affected by cyberattacks and hacking in 2016.
Key takeaways include:
Endpoints, especially user endpoints, are where most attacks get started, according to multiple SANS surveys. However, next-generation endpoint controls, while progressing, are not keeping up with the variety of devices and threats. SANS survey on next-generation endpoint risks and protections, covers how the endpoint landscape has changed in the past year and what IT security teams have done to improve their security posture. SANS explores whether or not organizations' tools and services are up to next-generation demands.
Key takeaways include:
Ransomware and malware are the bane of every IT pro's existence. With new threats on the scene every day, it's practically a full time job itself to stay ahead of the curve. On this video meetup we’ll be talking with experts from Malwarebytes and an IT pro from the Spiceworks Community to find out their best tips for preventing infection, and what mistakes you could be making.
Key takeaways include:
According to ISACA’s 2015 Global Cybersecurity Status Report, only 38% of global organizations feel that they are prepared to handle a sophisticated cyberattack. Unsurprisingly, PWC’s “The Global State of Information Security Survey 2016” further reveals that despite the detection of a 38% increase of security incidents from 2014 to 2015, many organizations do not have the proper framework to protect themselves against cyber threats. It’s clear that in today’s relentlessly evolving digital landscape, attackers are constantly discovering new and innovative ways to infiltrate enterprise systems.
As the rise of ransomware, malvertising, and other cyber threats continue to rise, CIOS and IT leaders’ roles within the organization are rapidly evolving, as they are faced with the task of properly detecting and Combating these threats. To do this, they must continually assess questions such as: Are we aware of our top weaknesses? Are we fully briefed on the latest developments within the ransomware and malvertising space? And should a threat emerge, do we have a plan?
Speakers: Justin Dolly, Malwarebytes Steven McLean, ISO, Biomet John Newcomer, SVP Information Security, CITI Peter Rosario, ISO, USI Holdings
The malware hitting today’s enterprises is very different from the malware they were fighting a year ago. New methods of disguise, new types of behavior, and new methods of automated malware generation mean that every day, most organizations are facing malware that is more effective, in forms that they have never seen before, in volumes that are overwhelming to current defenses. How can enterprises detect and eradicate these new threats?
In this fascinating webinar, top malware experts discuss the latest developments in malware, including new methods of obfuscation, polymorphism, and ransomware. You’ll get a look at how the most current malware behaves, and how it adapts to the environment it infects. Best of all, you’ll get insight on how to detect the latest exploits, and how to build up your anti-malware defenses to help mitigate the effects of new attacks.
Speakers: Tim Wilson, Dark Reading Editor Chief, Gal Shpantzer, Independent Security Consultant Adam Kujawa, Malwarebytes
All winning teams start with a game plan. When you’re captain of your IT team — you need to make a cybersecurity game plan to protect against advanced threats. Schools are prime examples of targets for evolving threats. With tight budgets, wide open campuses, and diverse endpoints — it’s no wonder attacks on schools, like ransomware, have multiplied in recent months. Despite the challenges, it’s up to IT and security professionals to gain a clear understanding of their security threats and create a winning game plan for their team.
Whether you’re an IT security professional working for an organization or an educational institution, attend this webinar to see what schools are doing to protect against cyberthreats and discover game changers you can bring to your team to create a winning cybersecurity game plan.
Listen to this webinar and you will:
Ransomware has become one of the biggest cyber security threats in the world, with instances of ransomware in exploit kits increasing about 44% in the last six months. The business of ransomware is on pace to be a $1 billion a year crime.
Through an exclusive survey with Osterman Research of more than 500 CIOs, CISOs and IT Directors in the U.S., Canada, Germany and the U.K., Malwarebytes is dedicated to helping businesses prevent ransomware. Download this webinar and hear directly from Michael Osterman on this research.
In this webinar we will discuss:
Cybercrime is big business because it works. And because it works, it’s a growing industry attracting smart criminals. As these attacks increase in speed and sophistication, organizations need to be able to recognize the patterns and disarm the threat within seconds before your company data is held hostage. Attend this webinar to learn where the threat landscape is headed and gain insight into what steps you should be considering to counter it.
Key takeaways include:
Malvertising is becoming more sophisticated and prevalent--and is the vehicle of choice for injecting ransomware.
As these attacks increase, you need to be able to recognize the patterns and disarm the threat within seconds before your company data is held hostage.
Better understand of the impact of malvertising and ransomware. Learn some of the biggest misconceptions, and see how these attacks are delivered and why your company may be at risk--without you even knowing it.
Key takeaways include:
Speakers: Dana Torgersen, Adam Kujawa & John Pescatore (SANS Analyst)
Malvertising is increasing in sophistication and prevalence, and often being used to distribute ransomware. According to the FBI, criminals are netting an estimated $325–500 million a year through these scams. But while the FBI is warning of a rise in ransomware, they are at a loss when it comes to how to handle it: “The ransomware is that good,” says Joseph Bonavolonta, the Assistant Special Agent in Charge of the FBI’s CYBER and Counterintelligence Program in its Boston office. “To be honest, we often advise people just to pay the ransom.”
As malvertising-based infections (including ransomware) in businesses increase, questions will arise on who is accountable – ad networks, site owners, or owners of the ad content? If your company is a victim, and the FBI is just advising to pay the ransom, can you begin to seek legal remedy against the ad networks or content owners that were the vector for the infection?
This webinar gives the audience a better understanding of the impact of malvertising and ransomware. It will also tackle some of the biggest misconceptions, latest tactics/incidents, how these attacks are delivered and why your company may be at risk without you even knowing it.
Attack surfaces continue to grow, especially as businesses add endpoints and permit new Internet of Things (IoT) to connect to their network. That’s why it’s more important than ever to evolve security to meet today’s changing device and threat landscapes. Join Malwarebytes and G.W. Ray Davidson with SANS Institute as we drill down deeper on recent findings from the SANS 2016 Endpoint Security Survey.
Attend this webinar to learn:
The SANS 2016 survey attempts to define what an endpoint is and explore what types of endpoints are most targeted and why. This webcast will present the first half of the survey results, which are presented in a two-part webcast. It focuses on the evolving definition of endpoints and how that influences endpoint security today.
Attendees will learn:
While traditional security practices still apply in today’s threat landscape, the advanced threats seen in 2015 make it clear that the basics are no longer enough to protect your company. With that in mind, join us as we highlight 10 tips for surviving this year—focusing on what to do and what not to do--to prevent cybercrime in 2016.
Throughout 2015, there seemed to be a never ending exploit of Adobe Flash. Every time a patch was released, cybercriminals found another security hole. And IT admins everywhere struggled to keep pace with the patches. Who knows what the zero-day exploits will be in 2016? But if history is any indication, the proliferation of exploits will continue and leave your employees at risk even while using the programs they trust. Attend this webinar to watch our Malware Intelligence team break down this year's Flash zero-days and learn steps you can take to ensure your business has a secure 2016.
In order to hit their targets, malware developers need to constantly evolve their tactics. This evolution is frequently done in very small incremental changes to known malware attacks. Today, malicious developers know their malware has a short half-life before detection. In order to optimize their efforts, cyber criminals now modify their "products" just enough to evade detection a little bit longer.
Join this intensive webinar to learn:
Speakers: Adam Kujawa, Head of Malware Intelligence, Malwarebytes
Today's cyber attacks utilize themost complex threat technologies to infiltrate users' computers. Yet much ofthe danger actually lies outside of the code. When attackers combine atechnological attack with psychology—a social engineering tactic similar toadvertising—their reach and effectiveness increases greatly. While most of thesecurity industry is focused on employing new monitoring systems and patchingsecurity holes, at the end of the day, the ultimate target for cyber criminals is the users themselves.
As attacks became increasingly diverse, numerous and sophisticated, organizations need to take a multi-layered approach to security that goes well beyond traditional endpoint anti-virus and other point solutions. In this webcast, independent information security expert, Kevin Beaver, and Adam Kujawa, Head of Malware Intelligence with Malwarebytes will discuss the holes in a typical layered security approach, share stories, and outline specific technical, procedural, and human defense measures you have to have in order to have a truly successful information security program.
Zero-days are no longer only used in targeted attacks or by nation states. Mainstream exploit kits are also leveraging them to distribute some of the most vicious malware, such as ransomware. The threat is real and the business risks are immeasurable. In this webcast, independent information security expert, Kevin Beaver, and Jerome Segura, Sr. Security Researcher with Malwarebytes will discuss the big-picture challenges and solutions associated with zero-day exploits and malware against the enterprise. You'll learn specific ways to address your zero-day risks along with how to effectively block and respond to exploit attempts on your network in order to minimize the impact to your business.
At a recent SC Congress eSymposium, Malwarebytes' malware crushing experts delivered an insightful look inside a zero-day malware attack campaign. Since traditional anti-virus approaches leverage lists of known malware to protect against attacks, they can become minimally effective at protecting against zero-day campaigns which are being introduced into the cyber ecosystem for the first time.
Audience: Geared for the IT administrator, but open to anyone interested in cyber security.
What are exploits? How do they work? What makes them so dangerous? And what can be done to protect your users and network against exploit-based attacks? Learn this and more as Malwarebytes researchers tackle one of the most dangerous forms of cyber attack facing businesses today. The webinar will close with a live Q&A session, so you can have your questions answered directly.