Attacks have become part and parcel of an organisation’s lifespan. However, in most cases, this is the result of the attacker being able to exploit a weakness in the organisation. Thus, organisations must do what they can to understand their vulnerabilities and their impact. But understanding and reporting common vulnerabilities and exposures (CVEs) are rigorous tasks. Therefore, companies may benefit from using tools to increase automation and reduce manual procedures. In this podcast, freelance IT industry analyst Bob Tarzey speaks with Benjamin Preminger, Senior Cyber Threat Intelligence Specialist at Sixgill.
Latest Hacking News Podcast #301: Interview With Gilad Israeli, Cyber Threat Intelligence Specialist at Sixgill
An interview with Gilad Israeli, a Cyber Threat Intelligence Specialist at Sixgill, a leading Cyber Threat Intelligence company.
Compromised Credentials: The Cyber Underbelly of Global Corporations
In late 2018 we saw the release of a massive amount of leaked credentials “dumps”. These expertly-curated collections highlight the risk posed by credentials leaked from large organizations. Join this webinar to understand how even most novice threat actors have the access and ability to exploit billions of sensitive corporate credentials, and how this threat affects your organization.
Latest Hacking News Podcast #256: Interview with Gilad Israeli of Sixgill – Compromised Chinese Rail Control System on Dark Web
Gilad Israeli, Cyber Threat Intelligence Specialist at Sixgill, talks to us about the discovery of an experienced threat actor selling access to a compromised Chinese rail control system on the dark web.
Off the Shelf Hacking Products
Cyber threat actors find a seemingly limitless supply of hacking tools and products in deep and dark web markets and forums. How far can an attacker go with a ready-made hacking tool that was bought on the dark web? Where would the attacker be from? And what are the most popular off-shelf hacking product these days?
The Global Cybercrime Industry – A Holistic View
The cybercriminal economy is based on a global illicit industry that, although unregulated, has well defined regions, suppliers, distributors, consumers, innovators, and end-users.
Join us for a qualitative view of cybercriminal hubs around the world – differentiating cultural and environmental factors, motivations, and what place each occupies in the cybercrime supply chain
How Cyber Criminals Stay Anonymous
Cybercriminals always strive to stay ahead of the curve. In this webinar, Alex Karlinsky will shed some light on the latest techniques they employ to stay under the radar of cyber security firms and law enforcement agencies.