Discover Security Events in Threat Intelligence
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
2 hours from now
This threat briefing focuses on how AI is actually being used in real world cyber attacks, separating exaggerated claims from operational reality. The session explains how threat actors are applying AI to amplify existing malware and disinformation tactics, and how media attention is being leveraged to increase pressure during extortion campaigns.
The discussion highlights current AI malware maturity, its impact on incident response, and recent case examples that show how attackers exploit public narratives. Attendees will gain practical guidance on applying intelligence led threat framing, monitoring AI service abuse, strengthening detections, and responding effectively without overreacting to hype.
2 hours from now
Digital trust is being challenged as AI generated voice, video, and imagery become realistic enough to enable large scale deception. This webinar focuses on how social engineering is evolving into a multi channel, AI native threat that moves beyond email into collaboration tools, messaging platforms, and social networks where defenses are often weakest. The discussion outlines why traditional security stacks struggle to detect these attacks when malicious activity appears legitimate to both tools and employees.
Doppel’s threat briefing presents its key SED predictions for 2026 and explains how organizations can adapt to this new reality. Attendees will gain practical guidance on prioritizing multi channel risk, implementing stronger verification workflows, and adjusting defenses for attacks that target trust rather than infrastructure. The session is designed for security leaders who want to prepare for a threat landscape where deception looks increasingly normal.
6 days from now
Dark web intelligence is becoming a critical part of proactive threat exposure management as attackers often know about weaknesses before defenders do. This webinar focuses on how integrating dark web intelligence with a mature attack surface management program helps security teams identify exposed credentials and early criminal activity before it turns into an active breach.
Searchlight Cyber and Calian will show how MSSPs and internal security teams use dark web monitoring to uncover risks earlier than traditional perimeter controls. Through live demonstrations and real investigation examples, the session highlights how compromised access is detected, how reconnaissance activity is surfaced, and how these insights support faster and more effective response.
6 days from now
Cyber risk is no longer limited to technical incidents and is increasingly shaping business pressure, leadership decisions, and organizational resilience. This webinar examines how AI driven attacks, ransomware, and hacktivism are changing the nature of cyber threats and why many leaders are missing this shift. The discussion looks at how modern attacks are designed to appear legitimate, apply sustained operational pressure, and escalate into legal, regulatory, and reputational challenges.
The session focuses on understanding this evolving risk landscape and what it means for executive decision making. Led by senior cybersecurity leadership, the webinar provides perspective on why traditional improvements in security posture are no longer enough and how organizations can better interpret and respond to threats that are meant to force strategic choices rather than simply disrupt systems.
1 week from now
Redefine how intelligence teams demonstrate impact by shifting from activity driven reporting to a model focused on strategic value. This webinar examines how intelligence functions can move beyond producing data and indicators to delivering insight that directly supports decision making and organizational priorities. The discussion centers on positioning intelligence as a capability that informs risk, protects critical assets and contributes to long term objectives.
Attendees will explore practical ways to measure performance based on influence and outcomes rather than volume of output. The session also covers how to communicate intelligence value clearly to senior leaders and how to structure programs around decisions and purpose instead of broad data collection. Designed for intelligence professionals, the webinar provides guidance for teams that want their work to shape real business outcomes.
5 days ago
Fewer ransomware victims in late 2025 may look like progress, but the underlying threat remains at its highest sustained level. This webinar breaks down why a short term drop in reported victims does not signal real improvement and how year over year totals continue to rise. Searchlight’s security team examines what this trend means for defenders and why misreading the data can lead to poor prioritization and budgeting decisions.
The session reviews the most active ransomware groups from the second half of 2025, highlights new and emerging actors, and explains how attack strategies are evolving. Attendees will also see how vulnerability intelligence and breached file data can be used to anticipate attacks and reduce exposure. The discussion is designed to help security teams better understand the current ransomware landscape and take more informed steps to minimize their attack surface.
5 days ago
Ransomware activity in the second half of 2025 appears quieter at first glance, but the overall threat level remains at record highs. This webinar breaks down why a temporary drop in victims does not signal progress and how year over year growth continues to reshape ransomware risk. Searchlight’s security team explains how misreading these numbers can lead to poor budgeting and prioritization decisions at a critical time.
The session examines the most active ransomware groups from H2 2025, how their tactics are evolving, and what new groups are emerging. Attendees will also see how vulnerability intelligence and breached file data can be used to anticipate attacks earlier and reduce exposure. This webinar is designed for teams that want a clearer, data driven view of ransomware trends and practical guidance for minimizing attack surfaces.
5 days ago
People-centric OSINT investigations often succeed because adversaries overlook small but revealing digital traces. This webinar focuses on how hidden and commonly missed open source data points can expose valuable intelligence when operational security fails. The session challenges the assumption that threat actors always cover their tracks and shows how everyday online activity can quietly increase risk.
The presenter demonstrates how to uncover overlooked OSINT sources, build a more complete view of individuals connected to an investigation, and identify exposure gaps before they are exploited. Attendees will also learn how to perform a personal OPSEC self audit to reduce their own digital footprint and strengthen defensive awareness.
6 days ago
Many organizations rely on threat intelligence feeds but still struggle to identify and respond to real threats. This webinar examines why threat intelligence programs often fail despite significant investment and explains what is missing when intelligence is treated as a tool rather than a capability.
The discussion focuses on common mistakes in how threat intelligence is built and used, including over reliance on technology and misaligned processes. Group IB shares practical insight into why intelligence efforts fall short and how organizations can develop intelligence that supports clearer understanding, better decision making, and more effective threat response.
6 days ago
Threat intelligence is revealing clear signals about where major breaches are headed in 2026 and how attackers are preparing long before incidents make headlines. This webinar examines real threat actor activity and dark web intelligence to show how behavior, tooling, and targeting patterns point to the next wave of high impact attacks. The session focuses on intelligence that appears weeks or months before traditional alerts surface.
The discussion highlights early warning indicators that many SOCs overlook and explains how intelligence led teams turn raw data into timely action. Using real operational examples, the webinar shows how threat intelligence can be embedded into day to day security operations to anticipate attacks and reduce response time.
6 days ago
This Level 2 threat hunting workshop focuses on identifying and investigating privilege escalation techniques that attackers use to expand control inside an environment. The session centers on real world telemetry, showing how escalation activity blends into normal administrative behavior and why it is difficult to detect at scale.
Participants will work through realistic datasets to analyze process behavior, permission changes, authentication artifacts, and system modifications that indicate privilege abuse. The workshop emphasizes intelligence driven investigation, using threat intelligence to guide hypotheses and validate findings rather than relying on isolated alerts. Designed for defenders with some hunting experience, this hands on session builds confidence in tracing escalation paths and applying consistent investigative methods in production environments.
1 week ago
Security operations are entering a new phase where autonomous intelligence allows defenders to detect and respond to threats at machine speed. This webinar focuses on how AI driven security operations are changing the balance in favor of security teams, reducing response time while allowing analysts to concentrate on higher value strategic work. The discussion explains why traditional threat intelligence models are no longer sufficient as attack volume and speed continue to increase.
The session brings together insights from Forrester research and Recorded Future to examine how autonomous threat operations can support always on defense. Attendees will gain a clearer view of where the security market is heading, how autonomous intelligence fits into modern operations and what steps security leaders can take to prepare their teams for this shift. The webinar is designed for organizations looking to modernize security operations and stay ahead of rapidly evolving threats.