Webinars

Check out a Malwarebytes Webinar for more information on exploits and malware and how they work.

Cybercrime Tactics and Techniques: Q2 2018

Overview New ransomware, VPNFilter attacks, compromised routers, and increases of zero-day attacks are all indicators that cybercriminals are redirecting their energy to more potentially dangerous attacks. Join Malwarebytes Labs for a look at Cybercrime Tactics and Techniques: Q2 2018 Report. Key Takeaways...
 

It Starts With The Endpoint: SANS 2018 Endpoint Security Survey Results

Overview Endpoints almost always represent the first pawn in an attacker’s malicious movements inside a victim environment: Phishing, ransomware, and other forms of email- and browser-based attacks are compromising user endpoints, then attackers are using those endpoints to pivot deeper into the...
 

The Evolving Threat Landscape: Findings from the Front Lines

Overview As long as cybercriminals can make a profit, businesses and their data will always be a target. The past year saw the greatest breach in Internet history with WannaCry, but that may have been a drop in the bucket. Learn some...
 

Turning the Tables on Cryptojacking

Overview It seems that criminal hackers are always a few steps ahead of everyone else and the recent onset of cryptojacking is a great example. In this webinar, independent information security consultant, professional speaker, and writer of Hacking For Dummies, Kevin Beaver,...
 

Best Practices for Protecting Against Phishing, Ransomware and BEC Attacks

Overview Most organizations have been infiltrated by phishing attempts, and a growing number are being hit by ransomware and other threats. The impacts of phishing, ransomware, BEC attacks and other threats can be devastating. In some cases, a business may be forced...
 

Cryptojacking & Coinhive: The Risks Are Real

ABSTRACT Less than a year ago, Coinhive changed the history of cryptomining. In September 2017, Coinhive launched a service that enabled the mining of the Monero digital currency—directly within a web browser. The Coinhive API offers access for website owners to deploy...
 

Cybercrime Tactics and Techniques: Q1 2018

Don’t get too comfortable – might seem that it was a slow quarter for malware, but new players are making themselves known and wreaking havoc everywhere. Watch the on-demand Malwarebytes Labs Cybercrime Tactics and Techniques: Q1 2018 Report webinar.

 

Malware Incident Response

The incident response function is arguably the most important part of a healthy security program. Yet, many organizations haven’t given much thought to how they’re going to handle a malware outbreak, much less document the steps in a formal incident response plan....
 

Cybercrime Tactics & Techniques: 2017 State of Malware

In 2017, hackers had a huge impact on businesses with major outbreaks of ransomware like WannaCry and NotPetya. Watch the replay of Malwarebytes Labs in our annual look back. Take a deep dive in what threats grabbed not only our attention but...
 

Vendor Selection 2018

Many people view security products as commodities – choose the tool and check the box. Reality is showing us that security is not that simple. Rather than going with whomever gave the slickest sales presentation or lowest price, selecting the right vendor...
 

The New Mafia: Gangs and Vigilantes

In this webinar, we will be go over the New Mafia Report: Guide to Cybercrime for CEOs’ examines the rise of this activity and its ramifications for businesses. Through expert insight, this guide determines that the approach to stop cybercrime must reflect...
 

Cybercrime Tactics and Techniques Q3 2017

In our fourth Cybercrime Tactics & Techniques webinar, we are going to take a deep look at what threats got our attention the most during the last three months and what we expect to happen moving into the last quarter of 2017....
 

Fighting Ransomware

Fighting ransomware is not futile. Like any other security threat, there is a formula to understanding it and protecting against it. Although ransomware’s consequences such as data loss and unknown exposures are serious, managing this threat doesn’t have to be challenging. In...
 

Understanding the Depth of the Ransomware Problem in US

Ransomware continues to be a major problem—and the problem is only getting worse. Malwarebytes conducted an exclusive survey with Osterman Research asking 575 organizations worldwide how ransomware is impacting their business. The responses were sobering. Ransomware is a “top three” problem for...
 

Stop the Stopgaps: How to Look for New Security Technologies

Businesses have been trusting security vendors to protect their endpoints for years, but those vendors can’t keep up with the speed of the evolving threat landscape. They are failing in their promise to protect their customers, and these failures have opened the...
 

The Need for Layered Protection

The concept of a layered security defense has been around for millennia. Even since the beginning of IT as we know it, layered controls have made up the most resilient environments. Still, many organizations continue to struggle with this approach to security...
 

Cybercrime Tactics and Techniques Q2 2017

In our third Cybercrime Tactics & Techniques report we are going to take a deep look at what threats got our attention the most during the last three months of the year and what we expect to happen moving through the next...
 

Mitigating and Responding to Ransomware

Ransomware has been around since the late 1980s but in recent years has become a much more common and disruptive element for network defenders. In this webinar, we will discuss the three types of ransomware (Client-side, Server-side and Hybrid), how to mitigate...
 

Reducing Attacks and Improving Resiliency: The SANS 2017 Threat Hunting Survey Results | Part 2

Even though their processes aren’t formal or mature, respondents reported benefits from their hunting practices, including reduce attack surfaces and detection of unknown threats in the enterprise, according to the 2016 SANS Survey on Threat Hunting. In that survey, 74% of respondents...
 

Cybercrime Tactics and Techniques Q1 2017

Overview: In the quarterly Cybercrime Tactics and Techniques report our Malwarebytes Labs team looks deep into what is dominating the threat landscape. The Labs team specifically saw a significant shift in dominance of new threats and infection techniques in the first quarter...
 

Improving Cyber Defensive Postures | Breaches are Certain, Impact is Not

The industry is experiencing breach fatigue. Few bat an eye when we hear of the newest enterprise to be breached. Despite this understanding, the reputational and operational damages associated with breaches continue to skyrocket. In response, enterprises are directing more resources into...
 

Multi-layered Security

With new threats showing up on the horizon every day, staying ahead of the curve can seem like a full-time job for IT pros. The best defense is to make sure your security solution is multi-layered. Key topics include: Best practices for...
 

2017 State of Malware

In 2016, we finally saw the headlines catch up with the hype. Cyberattacks and cybersecurity, or a lack thereof, grabbed media attention on both the corporate and consumer sides, even becoming a key issue in the US presidential election. In this respect,...
 

SANS Nex-Gen Endpoint Risk and Protection

Endpoints, especially user endpoints, are where most attacks get started, according to multiple SANS surveys. However, next-generation endpoint controls, while progressing, are not keeping up with the variety of devices and threats. SANS survey on next-generation endpoint risks and protections, covers how...
 

Avoid These Ransomware Mistakes

Ransomware and malware are the bane of every IT pro’s existence. With new threats on the scene every day, it’s practically a full time job itself to stay ahead of the curve. On this video meetup we’ll be talking with experts from...
 

Combating Malvertising, Ransomware, and The Rise of Cyber Threats

According to ISACA’s 2015 Global Cybersecurity Status Report, only 38% of global organizations feel that they are prepared to handle a sophisticated cyberattack. Unsurprisingly, PWC’s “The Global State of Information Security Survey 2016” further reveals that despite the detection of a 38%...
 

Malware: New Threats and Trends

The malware hitting today’s enterprises is very different from the malware they were fighting a year ago. New methods of disguise, new types of behavior, and new methods of automated malware generation mean that every day, most organizations are facing malware that...
 

Cybersecurity: How to Win the Big Game

All winning teams start with a game plan. When you’re captain of your IT team — you need to make a cybersecurity game plan to protect against advanced threats. Schools are prime examples of targets for evolving threats. With tight budgets, wide...
 

The State of Ransomware: 2016 Survey Findings

Ransomware has become one of the biggest cyber security threats in the world, with instances of ransomware in exploit kits increasing about 44% in the last six months. The business of ransomware is on pace to be a $1 billion a year...
 

The Big Business of Cybercrime: New Threats and Tactics

Cybercrime is big business because it works. And because it works, it’s a growing industry attracting smart criminals. As these attacks increase in speed and sophistication, organizations need to be able to recognize the patterns and disarm the threat within seconds before...
 

Ransomware & Malvertising: Dominating the Threat Landscape

Malvertising is becoming more sophisticated and prevalent–and is the vehicle of choice for injecting ransomware. As these attacks increase, you need to be able to recognize the patterns and disarm the threat within seconds before your company data is held hostage. Better...
 

The Hidden Enemy: Malvertising and Ransomware

Malvertising is increasing in sophistication and prevalence, and often being used to distribute ransomware. According to the FBI, criminals are netting an estimated $325–500 million a year through these scams. But while the FBI is warning of a rise in ransomware, they...
 

Securing the Internet of Old Things (IoOT)

Attack surfaces continue to grow, especially as businesses add endpoints and permit new Internet of Things (IoT) to connect to their network. That’s why it’s more important than ever to evolve security to meet today’s changing device and threat landscapes. Join Malwarebytes...
 

Endpoint Security Survey 2016: The Evolving Definition of Endpoints

The SANS 2016 survey attempts to define what an endpoint is and explore what types of endpoints are most targeted and why. This webcast will present the first half of the survey results, which are presented in a two-part webcast. It focuses...
 

2015: The Year of the Flash Zero-Days

Throughout 2015, there seemed to be a never ending exploit of Adobe Flash. Every time a patch was released, cybercriminals found another security hole. And IT admins everywhere struggled to keep pace with the patches. Who knows what the zero-day exploits will...
 

Surviving 2016: Protecting Your Business From Advanced Cyber Threats”

While traditional security practices still apply in today’s threat landscape, the advanced threats seen in 2015 make it clear that the basics are no longer enough to protect your company. With that in mind, join us as we highlight 10 tips for...
 

Launch, Detect, Evolve: The Mutation of Malware Webinar

In order to hit their targets, malware developers need to constantly evolve their tactics. This evolution is frequently done in very small incremental changes to known malware attacks. Today, malicious developers know their malware has a short half-life before detection. In order...
 

Psychological Warfare: How CyberCriminals Mess With Your Mind

Today’s cyber attacks utilize themost complex threat technologies to infiltrate users’ computers. Yet much ofthe danger actually lies outside of the code. When attackers combine atechnological attack with psychology—a social engineering tactic similar toadvertising—their reach and effectiveness increases greatly. While most of...
 

Your Layered Security Defenses are Riddled with Holes…

As attacks became increasingly diverse, numerous and sophisticated, organizations need to take a multi-layered approach to security that goes well beyond traditional endpoint anti-virus and other point solutions. In this webcast, independent information security expert, Kevin Beaver, and Adam Kujawa, Head of...
 

Understanding Zero-Day Attacks and Gaining Control

Zero-days are no longer only used in targeted attacks or by nation states. Mainstream exploit kits are also leveraging them to distribute some of the most vicious malware, such as ransomware. The threat is real and the business risks are immeasurable. In...
 

An Inside View of a Zero-Day Campaign

At a recent SC Congress eSymposium, Malwarebytes’ malware crushing experts delivered an insightful look inside a zero-day malware attack campaign. Since traditional anti-virus approaches leverage lists of known malware to protect against attacks, they can become minimally effective at protecting against zero-day...
 

Exploits: How they work and how to crush them

Audience: Geared for the IT administrator, but open to anyone interested in cyber security. What are exploits? How do they work? What makes them so dangerous? And what can be done to protect your users and network against exploit-based attacks? Learn this...