{"id":22470,"date":"2023-07-13T16:10:43","date_gmt":"2023-07-14T00:10:43","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/07\/13\/news-16200\/"},"modified":"2023-07-13T16:10:43","modified_gmt":"2023-07-14T00:10:43","slug":"news-16200","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/07\/13\/news-16200\/","title":{"rendered":"From Malvertising to Ransomware: A ThreatDown webinar recap"},"content":{"rendered":"<p>Our recent webinar From Malvertising to Ransomware&nbsp;highlight the clear connection between&nbsp;malvertising&mdash;the practice of embedding malicious code within legitimate online advertisements&mdash;and the epidemic of ransomware attacks affecting businesses globally.<\/p>\n<p>Presented by Mark Stockley,&nbsp;security evangelist at&nbsp;Malwarebytes, and Jerome Segura,&nbsp;Director of Threat Intelligence at Malwarebytes, the webinar&nbsp;explains how malvertising has evolved into an effective entry point in the cyberattack &#8220;kill chain.&#8221;<\/p>\n<div style=\"padding: 56.25% 0 0 0; position: relative;\"><iframe loading=\"lazy\" src=\"https:\/\/player.vimeo.com\/video\/845063948?badge=0&amp;autopause=0&amp;player_id=0&amp;app_id=58479\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen=\"\" style=\"\" title=\"sizzle-full-no-stock\" width=\"100%\" height=\"420\"><\/iframe><\/div>\n<p> <script src=\"https:\/\/player.vimeo.com\/api\/player.js\"><\/script> <\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/07\/easset_upload_file33640_272642_e.mp4\" alt=\"\" \/><\/p>\n<p>By leveraging the broad reach and precision targeting of digital advertising, threat actors can compromise systems, gather valuable credentials, and ultimately lay the groundwork for debilitating ransomware attacks. Speakers mention the&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/06\/5-facts-to-know-about-the-royal-ransomware-gang\">Royal ransomware group<\/a>&nbsp;as&nbsp;just one example of a threat actor using this tactic.<\/p>\n<p>Toward the end of the webinar, the speakers provide a set of tips for protecting businesses from&nbsp;these&nbsp;attacks, including&nbsp;the importance&nbsp;of tools such as <a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">Endpoint Detection and Response (EDR) <\/a>and <a href=\"https:\/\/www.malwarebytes.com\/business\/managed-detection-and-response\">Managed Detection and Response (MDR)<\/a>&nbsp;in combatting them.<\/p>\n<p>If you missed the live session, it&#8217;s not too late to get the low-down on the malvertising-ransomware connection.<a href=\"https:\/\/player.vimeo.com\/video\/841014751?h=210877fe3f\"> Watch the full webinar here<\/a>&nbsp;to ensure you&#8217;re informed and prepared to tackle these nasty threats!<\/p>\n<p style=\"text-align: center;\"><strong><span class=\"blue-cta-bttn\" style=\"color: #ffffff;\"><a href=\"https:\/\/player.vimeo.com\/video\/841014751?h=210877fe3f\" style=\"color: #ffffff;\">Watch the webinar&nbsp;<\/a><\/span><\/strong><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/07\/inside-the-pervasive-malvertising-threat-a-threatdown-webinar-recap\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/business\" rel=\"category tag\">Business<\/a><\/p>\n<p>Get the low-down on our recent webinar From Malvertising to Ransomware.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/07\/inside-the-pervasive-malvertising-threat-a-threatdown-webinar-recap\" title=\"From Malvertising to Ransomware: A ThreatDown webinar recap\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/07\/inside-the-pervasive-malvertising-threat-a-threatdown-webinar-recap\">From Malvertising to Ransomware: A ThreatDown webinar recap<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1001],"class_list":["post-22470","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-business"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22470"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22470\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22470"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}