Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Redscan: Enhancing visibility, coverage and context

Find out why next-gen endpoint security is now vital to detect and respond to the latest threats. Defence evasion, more aggressive ransomware tactics, and targeted attacks on remote workers. These are just some of the adversarial trends we've seen in 2020 that make detecting and responding to the latest threats both more challenging and more important than ever.

Redscan: Dissection of a spear phishing attack

Spear phishing continues to be one of the most common ways for cybercriminals to gain access to company networks. So how do cybercriminals execute these attacks, and why do they continue to be so successful? Join this Redscan webinar, hosted by Jed Kafetz, Redscan's Head of Pen Testing, for a detailed dissection of a spear phishing email attack targeting a C-suite executive. Through a series of easy-to-follow demonstrations, attendees will discover: The webinar is scheduled for 45 minutes including a Q&A.

Redscan: Emotet: A post-mortem?

After years of wreaking havoc, Emotet, one of the world's most dangerous botnets, has been taken down by international law enforcement agencies. But how did the malware and its creators manage to evade the authorities and infosec teams for so long, and what lessons can we learn to improve our defences against comparable threats? Join this Redscan webinar, presented by the Redscan Threat Intelligence Team, as they reflect on the rise and fall of Emotet and discuss.

Redscan: Protecting cloud workloads

As organisations migrate more workloads to the cloud, obtaining threat visibility across cloud infrastructure and services such as AWS, Microsoft 365 and Salesforce has become essential. Cloud computing is broadening the available surface for cybercriminals to attack, highlighting the importance of proactively identifying and responding to threats before they result in serious data breaches. Join this Redscan webinar, hosted by Michael Cowley (Head of Pre-Sales) and Matt Kirkby (Enterprise Account Director) to understand how to monitor and protect your cloud workloads.

Redscan: Ransomware: Using EDR and Threat Intelligence to combat the latest attacks

Ransomware continues to be a dominant factor in the threat landscape, which has changed drastically following recent attacks. With more and more organisations falling victim to ransomware in 2021, ensuring that your business has appropriate controls in place to detect and respond to attacks is essential.

Redscan: Achieving the best security outcomes through SIEM Use Cases

Security Information and Event Management (SIEM) is a set of integrated log management and monitoring tools that help organisations detect and respond to cyber-attacks. SIEM systems aggregate, normalise and correlate log event information from endpoints, infrastructure and applications to detect potentially malicious activity. When anomalous behaviour is identified, an alert is generated for investigation.

Redscan: Making the Most of Digital Risk Protection in Today's Threat Landscape

Hosted by Kroll and Redscan cyber risk experts, this webcast will address digital risk protection (DRP) and share impactful use cases for today's threat landscape. Often classified as "dark web monitoring," DRP can be merged with cyber threat intelligence services to not only track threats but take action against threats happening outside of your network. Examples of such include, but are not limited to social media platforms, forums, domain registrations and account takeovers.

Redscan: Q4 2021 Threat Landscape Virtual Briefing: Software Exploits Abound (EMEA)

Cyber vulnerabilities are being exploited at breakneck speed, with Kroll identifying a 356% growth in the number of incidents where zero-days or freshly-announced vulnerabilities were the initial infection vector, compared to Q3 2021. Adding stress to blue teams trying to manage patches and updates, remnants from attacks against Microsoft Exchange Servers from earlier in 2021 continue to be exploited even after servers have been fully patched.

Rubrik: Protecting and Recovering Your Virtual Environments

Your virtual environments are hosting your most critical applications. Are you confident in your protection from cyber threats, ransomware attacks, rogue employees or natural disasters? When the inevitable happens, how quickly can you recover so your businesses is back up and running? With Rubrik Zero Trust Data Management solution you can be confident that your data is always secure and available, and that you can recover with near-zero RTOs. Basically, with Rubrik, you have a better, faster way to manage your virtual environments.