Intel471-Logo-white.png
Resources

Webinars On-Demand

Webinar-listing-thumbnail.png

Guests Check-in, Cybercriminals Cash-out: Protecting Payment Data from Phishing Attacks

In this webinar, you’ll learn how one cybercrime and fraud operation is targeting hotel guest payment card data in hotel booking systems. They’re not just abusing Booking.com’s brand in phishing email

Threat-Hunting-Workshop-thumbnail.png

Threat Hunting Workshop 12: Hunting for Collection - Level 1

With Intel 471’s powerful in-depth cyber threat intelligence and HUNTER Platform, we will demonstrate how to effectively transition from intelligence to precise, operationalized threat hunting for col

Threat-Hunting-Workshop-thumbnail.png

Threat Hunting Workshop 11: Hunting for Command and Control - Level 1

Our workshop will unpack the intricacies of command and control, exploring the methods adversaries employ to use this tactic. We'll explore the most prevalent techniques used for command and control a

Webinar-listing-thumbnail.png

Are They Who They Say They Are? An Introduction to Know-Your-Customer Fraud April 2024

Rapid digitalization and demand for online services have rendered Know-Your-Customer (KYC) identity verification processes a must for financial institutions and beyond to protect against fraud.

Webinar-listing-thumbnail.png

On the Money: The Top Cyber Threats to the Banking Industry Mar. 2024

Threat actors have the banking industry in their sights. The lucrative outcomes that a successful attack on an organization can provide and the industry’s growing digitization have created the perfect

Threat-Hunting-Workshop-thumbnail.png

Threat Hunting Workshop 10: Hunting for Initial Access - Level 1

Dive deep into the nuances of Initial Access, a critical area in the cybersecurity landscape. Our workshop will unpack the intricacies of this tactic, exploring the methods adversaries employ to escal

Webinar-listing-thumbnail.png

Keys to the Kingdom: An Analysis of Ransomware and Access Trends in 2023 Feb. 2024

Ransomware deployments are increasing each year, and so are the sophistication of the attacks. Without initial access to an organization, these attacks would not be possible. In today’s highly digital

Webinar-listing-thumbnail.png

Crashing the Party: How to Leverage CTI to Mitigate Supply Chain Risk Jan. 2024

As supply chains have increased in complexity and interconnectivity, so too have operational demands for digital solutions to monitor and manage them more efficiently. In tandem with these development

Threat-Hunting-Workshop-thumbnail.png

Threat Hunting Workshop 9: Hunting for Privilege Escalation - Level 1

Get ready to elevate your threat hunting skills with Intel 471's exhilarating and interactive workshop, focusing on the pivotal MITRE ATT&CK Tactic: Privilege Escalation. This isn't just another works

Webinar-listing-thumbnail.png

Malware 101: Power up your investigations; Protect your organization. Dec. 2023

Malware attacks continue to increase in velocity and sophistication. No industry is safe from being targeted by the threat actors driving them. Invaluable insights and details about a cyber incident c

Webinar-listing-thumbnail.png

Bypassing With Bots: How Adversaries Use Automated Services to Sidestep OTPs Oct. 2023

Not all passwords are created equal. They may range from silly to scure, but one thing they have in common is that they’re the gateway into sensitive information. The good news is that tools like mult

Webinar-listing-thumbnail.png

Q2 Ransomware 2023: Reviewing Third-Party Risk Sept. 2023

Join Intel 471’s webinar as we shine a spotlight onto increasing ransomware attacks.

Sign up for our Executive Intel Update

Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.