Leading Cyber Ladies, the DFIR Edition


Details
Join our engaging cybersecurity event in TLV! Learn about the latest threats & guardrails from experts & network with the pros. Don't miss!
:: :: :: :: :: :: :: :: :: :: :: :: :: :: ::
## What’s on the agenda?
5:00 pm - Food, fun, and photo booth
-
Get your new LinkedIn profile pic!
-
5:30 pm - Welcome words
Leading Cyber Ladies and Cato Networks intro -
5:45 - 6:35 - A ransomware battle royal: The cybersecurity battle you can't afford to lose
Danna Pelleg, MDR Manager at Cato Networks
Sharon Fisher, Security Analyst at Cato Networks -
6:35 - 7:15 Leave no trace behind - D. B. Cooper in the digital age
Estie Rubinstein, Web Researcher at IBM
Can't wait to see you there!
:: :: :: :: :: :: :: :: :: :: :: :: :: :: ::
## A ransomware battle royal: The cybersecurity battle you can't afford to lose
In this session, we will discuss the rising threat of Ransomware and its impact on businesses. As cyber threats continue to evolve, Ransomware attacks have become a common and costly problem for organizations. In this "Ransomware Battle Royal" session, we will explore the different motivations behind these attacks, such as financial gain through Ransomware-as-a-Service (RaaS) and geopolitical motives of various groups.
We will also discuss the high-level kill chain of a destructive ransomware attack and the various techniques used in these attacks, including real-life examples. Through this session, attendees will gain a better understanding of the latest tactics used by ransomware attackers and learn how to protect their businesses from these dangerous threats.
Whether you are a cybersecurity professional, a business owner, or simply interested in the evolving threat landscape, this session is a must-attend. Join us for an informative and engaging discussion on the cybersecurity battle you can't afford to lose.
:: :: :: :: :: :: :: :: :: :: :: :: :: :: ::
## Leave no traces behind- D. B. Cooper in the digital age
One of the most powerful attack types modular banking malware carries out is web injections. Web injections manipulate users in real time, tricking them into playing along with the attacker’s schemes. Analyzing web injections is notoriously a way to warn banks and help protect their customers. Malware authors go to great lengths to hide their injections, fetch them in real time, and lately – deleting them entirely as a way of hiding their content and for wiping traces. Is this the end of the road for researchers looking into injections for important clues?
This brief technical session will prove that malware can run but it can’t hide. Going head-to-head with attackers means coming up with new and ingenious ways to detect attacks and stop malware in its tracks, and we will cover a special case study that you won’t want to miss.
COVID-19 safety measures

Leading Cyber Ladies, the DFIR Edition