Malware Mayhem: The Evolving Threat Landscape

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Financially motivated malware, commonly referred to simply as ‘crimeware, is by far the most prevalent threat facing organizations and individuals alike and represents billions of dollars in losses annually.

In 2018, the malware threat landscape saw many twists and turns. Traditional dangers like ransomware continued to hit companies and impact their bottom line, whilst newer threats like cryptojacking – the surreptitious mining of crypto currencies – had notably significance in the first half of the year.

The previous 12 months showed the industry that malicious attackers constantly strive to achieve maximum impact and gain, in both tactics and technology.

This webinar will explore how financially motivated malware has changed the security landscape over the last year.

Key takeaways:

  • Insight into the historic malware trends of 2018
  • Global perspective of financial malware
  • How to identify and track malware

Speakers

Photo of Michael Hill

Michael Hill

Former Editor, Infosecurity Magazine

Photo of Brandon Levene

Brandon Levene

Head Of Applied Intelligence, Virus Total

Photo of Raef  Meeuwisse

Raef Meeuwisse

CISM, CISA, Author of Cybersecurity for Beginners

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.