On-Demand Webinar

From Phishing to the Dark Web: The Life Cycle of a Cyber Attack

  • Stefanie EllisAntiFraud Product Marketing Manager, MarkMonitor

Understanding the life cycle of a cyberattack – including how threat actors use social engineering & phishing lures to effectively collect credentials and other types of Personally Identifiable Information (PII), and how those credentials are then monetized and sold in bulk on the dark web – can provide useful data points in understanding possible safeguards for an organization and your customers.

Please tune in as MarkMonitor AntiFraud expert Stefanie Ellis walks through the cyberattack life cycle. She provides insights that reveal valuable intelligence that can help protect your organization.

During this webinar, you'll learn the life cycle of planning and executing an attack, including:

  1. The hook: the social engineering tactics used to lure a victim
  2. The gold: what kind of data is stolen
  3. The endgame: how the threat actor monetizes their stolen data

Share:

Please complete this form below to view the webinar From Phishing to the Dark Web: The Life Cycle of a Cyber Attack.

US (800) 745 9229

|

Global +1 (415) 278 8479

|

Europe +44 (0) 1978 528 370

All Contact Information

Search WHOIS