article thumbnail

Webinar on cyberattacks in Ukraine – summary and Q&A

SecureList

About the webinar. Due to time limitations, we could not address all questions during the webinar, so here are our answers for the remaining questions we received in the live session: Q: What are the chances that we’ll see attacks using enterprise resources to launch attacks?

DDOS 119
article thumbnail

Webinar: Inside the REvil Ransomware – Pick Your Path

Security Boulevard

The post Webinar: Inside the REvil Ransomware – Pick Your Path appeared first on Security Boulevard. Today's ransomware actors are operating to devastating effect as evidenced by the Colonial Pipeline and JBS attacks, showing that a successful attack can disrupt any business.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Webinar: Live Attack Simulation – Ransomware Threat Hunter Series

Security Boulevard

The post Webinar: Live Attack Simulation – Ransomware Threat Hunter Series appeared first on Security Boulevard. The challenges presented by a multi-stage ransomware attack to large organizations with a mature security team in place are unique and require an informed response. .

article thumbnail

How to apply for the grant scheme to improve SME cybersecurity

BH Consulting

Its web page has a good breakdown of the grant process for the review and remediation stages, along with a webinar you can watch back. Cyber Ireland, the national cybersecurity cluster, contributed to developing the scheme. As with the review, the funding covers 80 per cent of the total project cost.

article thumbnail

Behind the scenes with the head of Kaspersky’s GReAT

SecureList

Unfortunately, none of the antivirus products that were available back then were actually able to clean the virus, so the teachers who knew I had some experience with computers asked me if I could write an antivirus for it. And slowly, this turned into a more capable antivirus product. What makes research successful?

Antivirus 106
article thumbnail

Australia Stresses Cybersecurity Precautions in Wake of Ukraine Conflict

Duo's Security Blog

Firewall status, drive encryption status, password status and whether an antivirus or anti-malware agent is running can all contribute to improved security resilience. Resources Webinar: Essential Eight - How Does Your Organization Rate? Solution Brief: Duo for Essential Eight Customer Story: Deakin University.

article thumbnail

Protecting Industrial Control Systems Against Cyberattacks – Part 1

Security Boulevard

This renders the attacks undetectable and able to bypass conventional security solutions such as EDR, antivirus and other traditional security lines of defense. Webinar: Analysis of the Florida Water Utility Cyberattack . Webinar: Florida Water Utility Attack Demonstration. Webinar: Runtime: The New Security Battleground.