ONG-ISAC & SilentPush
SilentPush explored how to track and monitor Scattered Spider phishing infrastructure and showcased how brand Impersonation queries can be used to detect and monitor Scattered Spider brand spoofing campaigns.
SilentPush explored how to track and monitor Scattered Spider phishing infrastructure and showcased how brand Impersonation queries can be used to detect and monitor Scattered Spider brand spoofing campaigns.
During this webinar, security strategist Aamir Lakani discussed what the new year will bring as new threats emerge, old threats are recycled with new techniques, and the threat landscape continues to expand.
Compliance with the new SEC cybersecurity rules were discussed in light of the recent effectiveness of the SEC’s new guidelines regarding cybersecurity disclosure.
Overview of Living Off the Land attacks, why attackers use them, some industry work in this area, examples, and how to mitigate against this threat.
Fortress Information Security defined, explored, and answered common questions on the ways Software and Hardware Bills of Materials can be used to analyze supply chain security and product vulnerabilities of energy technologies.