Don’t Play Footsie with Cybercriminals
Webinar: Unveil the top darknet exposure trends for London’s FTSE 100 companies, including insights on password reuse, stolen session cookies and cloud app exposures
Top Identity Exposure Trends from the Criminal Underground
On-Demand Webinar: We break down the latest trends related to identity exposure in the criminal underground and how this data puts organizations and consumers at risk of cybercrime.
Insane in the Membrane: Why Old Tactics Fail for Ransomware Prevention
On-Demand Webinar: Learn about a new, more complete and more effective approach to preventing ransomware called Post-Infection Remediation.
Shining a Light Into the Dark Web
On-Demand Webinar: Learn how stolen data makes its way from small circles of bad actors to the dark web and how to identify legitimate consumers interacting with your site vs. criminals leveraging stolen data.
Mind the Gap: Closing Ransomware Risk Visibility Gaps
On-Demand Webinar: Benchmark your ransomware preparedness & discover proactive strategies to solve your defense blindspots.
Consumer or Fraudster: Balancing Fraud Losses and the Customer Experience
On-Demand Webinar: Experts from Aite-Novarica and SpyCloud discuss the latest trends in fraud and what organizations can do to protect themselves while balancing losses and the customer experience.
Combating Fraud from Stolen Cookies: Introducing SpyCloud Session Identity Protection
On-Demand Webinar: A detailed look at how anti-detect browsers + malware-stolen data put consumers at risk of fraud, and how Session Identity Protection helps protect your bottom line by offering early warning of malware-infected consumers with compromised web session cookies.
The Fraudacity of Cybercriminals: How 15.5B Recaptured Data Assets Shine a Light on the Criminal Underground
On-Demand Webinar: Analysis of the 15+ billion assets we recaptured in 2021 and what we can learn from patterns we’ve observed in the criminal underground over the last 12 months.
Real or Synthetic? Introducing SpyCloud Identity Risk Engine
On-Demand Webinar: A detailed look at how Identity Risk Engine turns recaptured data into a clear fraud signal that complements your existing control framework.
All Criminals Want for the Holidays is You(r Data): An Inside Look at How Cybercriminals Profit Off the Holiday Season
On-Demand Webinar: SpyCloud researchers share an inside look at 2021 holiday shopping trends on popular cybercriminal communities, including botnet logs for sale that allow bad actors to impersonate your consumers.
The Ransomware/Stolen Credentials Connection
On-Demand Webinar: We break down the ransomware ecosystem, adversary groups’ latest tactics, and strategies to mitigate your risk and avoid paying millions to ransomware gangs.
Another [1.5] Bites the Dust: Key Learnings from 1.5B Stolen Credentials You Should Never Use Again
On-Demand Webinar: We break down the trends our researchers observed within cybercriminal communities over the last 12 months, including the breached data cybercriminals have been stealing and sharing, and how your cybersecurity plans should adjust as a result.
Everyone is a Target: The State of Account Takeover in the Telecommunications Industry
See the latest stolen credential statistics specific to telcos and get recommendations for mitigating risk. Presented by Bob Lyle, SpyCloud’s expert on telecommunications ATO fraud.
How the Holidays Affect Dark Web Cybercriminal Activity
The activity we saw on criminal marketplaces during the 2020 holiday shopping season surprised us – huge spikes in the sales of crimeware tools and stolen credentials for particular restaurants, airlines and other consumer services accounts. Get the details in this on-demand webinar.
Surviving a Data Breach – On-Demand
Security leaders who have been through worst-case scenarios offer real-world advice for stronger breach prevention & response. Get the audio file or watch the panel webinar on-demand.
Securing Consumers’ Identity – FinTech Webinar
We explore securing consumer identity against evolving criminal behavior & technology and share how one fintech platform is using breach data to inform their fraud algorithms in 4 innovative ways.
How Credential Stuffing Tools Are Made
Learn how credential stuffing works and get insights into the tools of the trade (including some very sophisticated custom Nintendo crimeware). Discover why stolen accounts that don’t have obvious monetary value can be profitable for cybercriminals.
I Put a Keylogger On You, and Now You’re Mine: What Cybercriminals See When They Infect a Host with Malware
See malware from the criminal perspective, including how the data collected from infected machines gets monetized. Learn how to shield your organization from the damage caused by credential-stealing malware.
Targeted Attacks: How Sophisticated Criminals Bypass Enterprise Security Measures
If your account takeover prevention program primarily focuses on automated credential stuffing attacks, you may be leaving your organization exposed to serious losses. Learn more in this webinar we hosted with ISMG.
Fortune 1000 Breach Exposure: What We Can Learn
SpyCloud has analyzed breach data tied to Fortune 1000 employee credentials to understand trends in password reuse and data exposure. See what it means for the organizations that work with them.
How the Holidays Affect Criminal Ecommerce
In this webinar, SpyCloud researchers discuss the trends they’ve tracked on criminal ecommerce sites, including fresh data on how Black Friday 2019 sales affected prices and sales volumes.
Hard Truths About ATO & Strategies To Defend Your Enterprise
Protecting your enterprise from breaches and account takeovers has never been a bigger challenge.
6 Myths About Account Takeover
Watch the 6 Myths About Account Takeovers webinar and learn which popular claims are oversold so you can make informed decisions about your own ATO prevention investment.
How Easy Is It To Bypass Multi-Factor Authentication Solutions?
Enterprises are trying everything they can to prevent cyber criminals from taking over employee and customer accounts to gain access to data and systems.