Contact Us
0 Results Found
              Back To Results
                Close Contact Us

                How Cybercriminals Are Adapting to Outwit Defenses and Rake in the Profits

                Key findings from Secureworks State of Cybercrime Report 2018

                Speaker: Alex Tilley - Senior CTU® Security Researcher
                Recorded: December 5, 2018
                Duration: 60 Mins

                Key findings from the report:

                • Ransomware is now more sophisticated than ever. Secureworks’ CTU researchers observed no less than 257 new and distinct ransomware families in 12 months
                • Cryptocurrency mining remains an extremely popular way for criminals to monetize access to infected computers. In 2017, at least one in three organizations experienced cryptocurrency mining activity on their network
                • Criminal gangs have combined advanced social engineering and network intrusion techniques with POS malware to generate millions of dollars of revenue through stolen payment card data. According to the FBI, business email compromise and business email spoofing alone have now generated $12B in financial losses since October 2013

                From July 2017 through June 2018, Secureworks Counter Threat Unit® (CTU) researchers analyzed incident response outcomes and conducted original research to gain insight into threat activity and behavior across 4,400 companies. Their findings, which include new data about who is conducting what types of attacks and why, will be shared in person by CTU experts on this webcast.

                We’ll examine a small subset of professional criminal actors responsible for the bulk of cybercrime-related damage worldwide and explain: how they’re leveraging the underground hacker economy, why they can’t be seen by researchers and law enforcement who monitor the dark web, and how we know their tools and techniques are as sophisticated, targeted and insidious as most nation-state actors.

                You’ll also learn how constant "background noise" from low-level criminality is impacting businesses around the world and see latest cost of stolen goods, hacking tools, and hacking services on the underground marketplace.

                View Your On-Demand Webcast

                All fields are required.
                Watch Now

                We generate around 2 billion events each month. With Secureworks, we are able to crunch down that number to 20-30 high fidelity alerts — and that makes my team's job much easier.
                Sunil Saale, Head of Cyber and Information Security, Minter Ellison
                Red Cloak™ Threat Detection and Response isn’t just the next generation of SIEM, it’s an evolution.
                David Levine, CISO, Ricoh Group

                Why Secureworks®?

                The old approaches to cybersecurity are no longer adequate. It’s time for something new. Layered defenses can create almost as many problems as they solve, and security teams struggle to keep up with the threat. What you need is context across all your layers of defense with the right people, processes, and technology working together in concert. That’s how Secureworks can help. Using 20+ years of industry knowledge, advanced analytics, industry-leading threat intelligence, and the network effect of more than 4,000 customer environments, we provide world-class cybersecurity solutions to customers around the globe. This unmatched experience empowers our customers to be Collectively Smarter. Exponentially Safer.™

                Our Managed Detection and Response (MDR) solution is comprehensive, powered by our cloud-native software Red Cloak™ Threat Detection and Response that uses AI and machine learning to deliver better outcomes for your security operations. MDR unifies telemetry from your existing security technology to maximize visibility, reduce complexity, and enable you to move at the speed of the threat. Learn more about how Managed Detection and Response uses contextualized visibility to improve your organization’s security posture.

                Related Content