Cyber Cocktails
PRODAFT
Cyber Cocktails
0:55
BLINDSPOT: Master the art of anticipation.
PRODAFT
BLINDSPOT: Master the art of anticipation.
1:58
The magic of approved cybersecurity budget
PRODAFT
The magic of approved cybersecurity budget
0:11
When the code betrays you
PRODAFT
When the code betrays you
0:06
If cyber threats were Olympic sports
PRODAFT
If cyber threats were Olympic sports
0:49
Cybersecurity professionals explain the dangers of ransomware
PRODAFT
Cybersecurity professionals explain the dangers of ransomware
48:17
How can keystroke logging compromise your credentials?
PRODAFT
How can keystroke logging compromise your credentials?
4:37
The cybersecurity pitfalls of social media you didn't know
PRODAFT
The cybersecurity pitfalls of social media you didn't know
4:02
Why does SystemBC dominate the ransomware scene?
PRODAFT
Why does SystemBC dominate the ransomware scene?
3:19
The vicious cycle of vulnerability reporting
PRODAFT
The vicious cycle of vulnerability reporting
0:06
The growing threat of cyber espionage
PRODAFT
The growing threat of cyber espionage
4:24
Cybercrime watch
PRODAFT
Cybercrime watch
0:18
What is the difference between deep web and dark web?
PRODAFT
What is the difference between deep web and dark web?
3:41
When you can smell the scam already
PRODAFT
When you can smell the scam already
0:09
Collaborative cyber defence: Merging public & private efforts
PRODAFT
Collaborative cyber defence: Merging public & private efforts
4:41
5 Reasons why Rhadamanthys will affect the cybersecurity landscape
PRODAFT
5 Reasons why Rhadamanthys will affect the cybersecurity landscape
3:22
Understanding Prometheus TDS
PRODAFT
Understanding Prometheus TDS
3:43
Ensure NIS2 compliance with BLINDSPOT (without blind spots)
PRODAFT
Ensure NIS2 compliance with BLINDSPOT (without blind spots)
4:23
The NIS2 Directive: What EU businesses need to know
PRODAFT
The NIS2 Directive: What EU businesses need to know
4:29
When work turns into Murphy's Law
PRODAFT
When work turns into Murphy's Law
0:09
Working in cybersecurity be like 🫠
PRODAFT
Working in cybersecurity be like 🫠
0:15
Zoom Drama #shorts
PRODAFT
Zoom Drama #shorts
0:06
What is the TOR network and how does it work?
PRODAFT
What is the TOR network and how does it work?
4:05
Chilling Cybercrime Statistics #shorts
PRODAFT
Chilling Cybercrime Statistics #shorts
0:19
Threat hunting VS incident response: What's the difference?
PRODAFT
Threat hunting VS incident response: What's the difference?
3:42
What should you know about cybersecurity in 2024
PRODAFT
What should you know about cybersecurity in 2024
3:58
How do you protect your online privacy?
PRODAFT
How do you protect your online privacy?
3:42
When the "no budget" logic backfires
PRODAFT
When the "no budget" logic backfires
0:09
Why is ransomware still such a persistent threat?
PRODAFT
Why is ransomware still such a persistent threat?
3:56
Supply chain resilience: Would your company last?
PRODAFT
Supply chain resilience: Would your company last?
3:43
Are remote workers susceptible to cyberattacks?
PRODAFT
Are remote workers susceptible to cyberattacks?
3:50
Raven Call EP6: The Precarious Future of Traditional Ransomware
PRODAFT
Raven Call EP6: The Precarious Future of Traditional Ransomware
50:25
What happens if LOCKBIT is dissolved?
PRODAFT
What happens if LOCKBIT is dissolved?
1:00
Significance of Public-private Partnerships in Cybersecurity
PRODAFT
Significance of Public-private Partnerships in Cybersecurity
1:00
Spoofing vs Phishing: Do You Know The Difference?
PRODAFT
Spoofing vs Phishing: Do You Know The Difference?
3:40
The Rise of Deepfakes: Can You Recognize Them?
PRODAFT
The Rise of Deepfakes: Can You Recognize Them?
4:04
How Can Cyberattacks Affect Critical Network Infrastructures?
PRODAFT
How Can Cyberattacks Affect Critical Network Infrastructures?
4:29
Conti & LOCKBIT: An Intricate Connection
PRODAFT
Conti & LOCKBIT: An Intricate Connection
0:51
Too soon to tell the aftermath of LOCKBIT
PRODAFT
Too soon to tell the aftermath of LOCKBIT
0:25
Are the Ransomware-as-a-Service Days Numbered? #OpCronos
PRODAFT
Are the Ransomware-as-a-Service Days Numbered? #OpCronos
1:01
Cybersecurity and Global Risk: Protecting Your Organization from a Deteriorating Risk Landscape pt2
PRODAFT
Cybersecurity and Global Risk: Protecting Your Organization from a Deteriorating Risk Landscape pt2
4:11
What Is The Difference Between DDoS and DoS Attacks?
PRODAFT
What Is The Difference Between DDoS and DoS Attacks?
3:58
How Can CISOs Address the Challenges They Face?
PRODAFT
How Can CISOs Address the Challenges They Face?
4:09
After a #cyberattack be like
PRODAFT
After a #cyberattack be like
0:41
Ready, Steady, Go: Traffic Lights Protocol (TLP) in Cybersecurity
PRODAFT
Ready, Steady, Go: Traffic Lights Protocol (TLP) in Cybersecurity
4:17
One Step Ahead: How To Use Threat Intelligence Efficiently?
PRODAFT
One Step Ahead: How To Use Threat Intelligence Efficiently?
4:38
AI and ML In Your Security Infrastructure: Integrating Threat Detection Systems
PRODAFT
AI and ML In Your Security Infrastructure: Integrating Threat Detection Systems
4:16
PRODAFT vs LOCKBIT #threatintelligence
PRODAFT
PRODAFT vs LOCKBIT #threatintelligence
0:33
Combating Insider Threats: Detection, Prevention,  and Implementation
PRODAFT
Combating Insider Threats: Detection, Prevention, and Implementation
4:40
Your Phone Is Listening: How to Sniff Out Eavesdropping Attacks
PRODAFT
Your Phone Is Listening: How to Sniff Out Eavesdropping Attacks
4:46
The Raven Camp Teambuilding
PRODAFT
The Raven Camp Teambuilding
0:59
SNATCH Ransomware
PRODAFT
SNATCH Ransomware
0:58
Teambuilding #cyber funsies
PRODAFT
Teambuilding #cyber funsies
0:59
The Impact of a Deteriorating Risk Landscape on Your Business
PRODAFT
The Impact of a Deteriorating Risk Landscape on Your Business
4:27
What Are The 7 Stages of a Cyberattack? Understand The Cyber Kill Chain
PRODAFT
What Are The 7 Stages of a Cyberattack? Understand The Cyber Kill Chain
5:18
10 Best Practices To Secure Your Data
PRODAFT
10 Best Practices To Secure Your Data
5:22
Can You Predict a Cyberattack? Myths And Misconceptions About Cybersecurity, Debunked
PRODAFT
Can You Predict a Cyberattack? Myths And Misconceptions About Cybersecurity, Debunked
4:05
Threat Intelligence & Risk Management: The Seemingly Odd Collaboration That Can Save Your Business
PRODAFT
Threat Intelligence & Risk Management: The Seemingly Odd Collaboration That Can Save Your Business
4:00
How to Utilise MFA So Your Passwords Are NOT Easy to Crack?
PRODAFT
How to Utilise MFA So Your Passwords Are NOT Easy to Crack?
5:03
Swiss Pavilion FIC 2023
PRODAFT
Swiss Pavilion FIC 2023
4:43
Internet of Things and Cybersecurity: How Do You Protect This Interconnected World?
PRODAFT
Internet of Things and Cybersecurity: How Do You Protect This Interconnected World?
5:13
The Reverse Side of AI:  How are Cybercriminals Using Artificial Intelligence?
PRODAFT
The Reverse Side of AI: How are Cybercriminals Using Artificial Intelligence?
5:12
Six Main Challenges Businesses Face in Risk Management & Assessment
PRODAFT
Six Main Challenges Businesses Face in Risk Management & Assessment
5:13
Seeing Through the Fog: Detecting Malicious Sites and Fake Social Media
PRODAFT
Seeing Through the Fog: Detecting Malicious Sites and Fake Social Media
4:36
Shameless Promo of PRODAFT's New Website
PRODAFT
Shameless Promo of PRODAFT's New Website
0:55
Understanding Social Engineering Techniques and Why They Are So Convincing
PRODAFT
Understanding Social Engineering Techniques and Why They Are So Convincing
5:07
Action Counts More than Intention: How to Make Threat Intelligence Actionable
PRODAFT
Action Counts More than Intention: How to Make Threat Intelligence Actionable
4:40
Common Money Laundering Practices and Cryptocurrency Uses by Cybercriminals
PRODAFT
Common Money Laundering Practices and Cryptocurrency Uses by Cybercriminals
4:47
2023 RECAP aka Cybersecurity in Numbers
PRODAFT
2023 RECAP aka Cybersecurity in Numbers
1:18
Proactive Vs. Reactive Approach to Cybersecurity
PRODAFT
Proactive Vs. Reactive Approach to Cybersecurity
5:01
What the Pandemic Taught Us about the Supply Chain Risks
PRODAFT
What the Pandemic Taught Us about the Supply Chain Risks
5:01
The Evolution of the Cybercriminal Tactics, Techniques and Procedures (TTPs)
PRODAFT
The Evolution of the Cybercriminal Tactics, Techniques and Procedures (TTPs)
4:13
Why Threat Actors’ Motivations Matter
PRODAFT
Why Threat Actors’ Motivations Matter
4:30
Why Cybercrime Groups Are Shifting Focus Towards Extortion
PRODAFT
Why Cybercrime Groups Are Shifting Focus Towards Extortion
4:14
What you Need to Know About Zero-Day and One-Day Vulnerabilities
PRODAFT
What you Need to Know About Zero-Day and One-Day Vulnerabilities
4:48
The Dark Side of Buying Tickets Online
PRODAFT
The Dark Side of Buying Tickets Online
4:57
Raven Call EP5: Utilizing The Covert Potential of Detection Engineering
PRODAFT
Raven Call EP5: Utilizing The Covert Potential of Detection Engineering
32:37
Raven Call EP4: The Intricate World of Cybercrime TTPs and Devious Affiliations
PRODAFT
Raven Call EP4: The Intricate World of Cybercrime TTPs and Devious Affiliations
35:44
PRODAFT - Teambuilding (Bouncing Castle)
PRODAFT
PRODAFT - Teambuilding (Bouncing Castle)
1:27
PRODAFT - Teambuilding (Camp)
PRODAFT
PRODAFT - Teambuilding (Camp)
1:13
PRODAFT - Team Building
PRODAFT
PRODAFT - Team Building
1:03
Raven Call EP3: Undertaking the Journey of Multiple Zero-Days
PRODAFT
Raven Call EP3: Undertaking the Journey of Multiple Zero-Days
29:07
Shorts - Raven Call: Nomadic Octopus’ Paperbug Campaign
PRODAFT
Shorts - Raven Call: Nomadic Octopus’ Paperbug Campaign
0:56
Raven Call EP2: Nomadic Octopus’ Paperbug Campaign
PRODAFT
Raven Call EP2: Nomadic Octopus’ Paperbug Campaign
27:24
Shorts - Raven Call: Evolution of Credential Theft & Infostealer Industry
PRODAFT
Shorts - Raven Call: Evolution of Credential Theft & Infostealer Industry
0:31
Raven Call EP1: Evolution of Credential Theft & Infostealer Industry
PRODAFT
Raven Call EP1: Evolution of Credential Theft & Infostealer Industry
13:34
PTI-117 (VoipDialer): Next-generation vishing attacks are on the rise
PRODAFT
PTI-117 (VoipDialer): Next-generation vishing attacks are on the rise
3:13