A Webinar Series About The Latest Phishing Attacks Challenging Businesses Today
Episode 10: Phishing + Ransomware — The Dream Team of Exploits
2021 was another year of record breaking ransomware attacks and payouts. Ransomware has increased with an attack happening every 11 seconds with global recovery costs exceeding $20B in 2021.
Watch security experts explore the tight relationship between phishing and ransomware on a 30-minute webinar to explore techniques hackers are using and what to look out for in 2022.
Episode 9: Hacking Humans on LinkedIn, Twitter, and SMS
Humans only need apps and browsers in the cloud to communicate at work and in every other aspect of life – video meetings, health charts, social life — every digital channel is susceptible. Fake login pages are no longer the only game in town; phishing can be delivered straight into browsers and apps, bypassing key security infrastructure.
Episode 8: Spear Phishing from Trusted Sites
65% of anti-phishing S%!T can’t stop these sophisticated threats.
Learn why these threats are successful and how to stop them with SlashNext’s founder, Atif Mushtaq, SlashNext CEO Patrick Harr.
Episode 7: Browser is the New OS
Critical strategies to protect against MitM, rogue apps, and attacks hiding on legitimate infrastructure.SlashNext’s founder, Atif Mushtaq, SlashNext CEO Patrick Harr, and Eric Quinn, CTO, C&S Companies, will explore techniques hackers are using and real-life examples of how these attacks are getting past current defenses.
Episode Six: Phishing and Ransomware —A Marriage Made in Hell
Given the rise in attacks on critical organizations like the Colonial Pipeline and JBS, ransomware is quickly becoming a Board of Directors-level issue. Ransomware uses phishing and social engineering as its main attack vector, so stopping it at the source is paramount. SlashNext’s founder, Atif Mushtaq, SlashNext CEO Patrick Harr, and Randy Watkins, Critical Start CTO, will explore the tight relationship between phishing and ransomware with real-life examples of how phishing leads to ransomware.
Episode Five: The Security and Privacy Conundrum in a BYOD World
Hackers are active in all communication channels weaponizing cloud and social tools and taking advantage of the fact that humans are the weakest link of the security process. With 67% of enterprises offering BYOD policies keeping the workforce secure while maintaining user privacy is essential for a successful security posture.
Episode Four: Breaking the MFA Myth
How hackers are bypassing MFA with astonishing accuracy in Episode Four of Phish Stories.
Hackers are abusing the trust in authenticated services that many organizations rely on heavily for protection. Understanding and preparing for how these silent but dangerous attacks are hacking into human vulnerabilities are imperative for protecting your organization.
Episode Three: New Threats Menacing Microsoft 365 Users Today
More than one million companies use Microsoft 365, and many of those companies are leaders in the finance, pharmaceutical, energy, and technology fields. With critical data to protect, these companies are ripe targets for the evolving second generation of phishing attacks. SlashNext Threat Labs are tracking over 1,000 active zero-hour spear-phishing attacks targeting Microsoft 365 in the last 60 days.
Episode Two: Zero-Hour Attacks Hacking Humans Today
With the new remote workforce, security teams face new challenges with protecting employees whose personal and professional lives have merged onto the same devices. At the same time cybercriminals are using automation and AI with incredible success. We’ll explore real life examples including:
- Latest spear-phishing attacks, including those targeted at Office 365 users
- Trends in mobile and browser phishing attacks
- Recommendations and resources for protecting your workforce from fast-evolving phishing attacks
Episode One: The State of Phishing
- Latest spear-phishing attacks on legitimate infrastructure
- Why Automation and AI are improving phishing success
- Why stopping phishing is imperative for all businesses in 2021
It’s Time to Get Started with SlashNext
Learn how to leverage the industry’s best zero-hour phishing protection in your environment.
6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566
© All Rights Reserved, SlashNext, Inc.