Botnets

Discover the latest collection of talks and videos on Botnets from industry experts.

Recent talks on Botnets

Defenders’ Guide 2025: Fortify the Future of Your Defense
Channel Logo

Defenders’ Guide 2025: Fortify the Future of Your Defense

The attack surface is not only getting wider but also deeper - wider as new attack vectors emerge, and deeper as threat actors find new ways to exploit
traditional ones. With the growing use of LLMs and APIs, we can only expect this expansion to continue. That’s why the Akamai SOTI research team created
something new for 2025; a practical, hands-on, highly technical defenders’ guide for those working on the front lines of the digital battlefield. Mapped to th…

Top Malware Threats of February 2025: What You Need to Know
Channel Logo

Top Malware Threats of February 2025: What You Need to Know

Cloud Storage Security’s internal threat laboratory, Casmer Labs, has been hard at work discovering and identifying the most current and pressing threats to
organizations that operate in the cloud. In February 2025, the top two most popular malware strains that Casmer Labs detected were Mirai, a well-known
botnet malware that targets IoT devices to launch DDoS attacks, and Prometei, a similarly dangerous botnet malware. Join us for this technical talk, where…

Beyond the Noise: ESET’s Curated Threat Intelligence for Proactive Defense
Channel Logo

Beyond the Noise: ESET’s Curated Threat Intelligence for Proactive Defense

In an era where cyber threats are increasingly sophisticated, corporations must adopt proactive strategies to safeguard their assets. Join our webinar to
discover how ESET's Threat Intelligence can transform your security posture. Unlike most raw telemetry feeds that require extensive processing, ESET offers
highly curated intelligence with low false positive rates and an AI advisor to assist you. Learn how recent research enables ESET's detection engine to block …

Suivre et analyser les activités des botnets pour prévenir les attaques par ransomware
Channel Logo

Suivre et analyser les activités des botnets pour prévenir les attaques par ransomware

Les botnets cybercriminels constituent un vecteur d'infection majeur dans les attaques par ransomware, causant des dommages significatifs aux
organisations. Surveiller activement les campagnes de distribution et les infrastructures des botnets permet de lutter efficacement contre cette menace. De
plus, une connaissance approfondie des menaces facilite le ciblage et le démantelement des infrastructures malveillantes, comme l'ont démontré les opér…

Advanced AI Strategies for Application Threat Mitigation
Channel Logo

Advanced AI Strategies for Application Threat Mitigation

As the evolution of digital threats never stops, traditional defenses like geo-blocking and IP reputation services often fall short, leaving critical
industries—government, finance, travel, and hospitality—vulnerable to sophisticated bot attacks. This webinar, hosted by Radware’s CTI Researchers, dives
into the current application threat landscape, exposing the limitations of common defense mechanisms against modern bots and Distributed Denial-of-Servi…

Advanced AI Strategies for Application Threat Mitigation
Channel Logo

Advanced AI Strategies for Application Threat Mitigation

As the evolution of digital threats never stops, traditional defenses like geo-blocking and IP reputation services often fall short, leaving critical
industries—government, finance, travel, and hospitality—vulnerable to sophisticated bot attacks. This webinar, hosted by Radware’s CTI Researchers, dives
into the current application threat landscape, exposing the limitations of common defense mechanisms against modern bots and Distributed Denial-of-Servi…

Under the Mask: Unveiling ELF Malware and DDoS-as-a-Service
Channel Logo

Under the Mask: Unveiling ELF Malware and DDoS-as-a-Service

Beneath the surface of the digital landscape, a growing threat is hiding in plain sight. In this revealing session, the Sysdig Threat Research Team will unmask
the insidious world of ELF malware and its role in powering DDoS-as-a-Service botnets. Sysdig Threat Detection Engineer Alessandra Rizzo will take you
through the inner workings of the "Rebirth" botnet, a Mirai variant exploiting vulnerabilities in cloud environments and beyond. Discover how these threats e…

Bot’s the Story, Morning Glory? Uncovering Oasis Ticket Scalper Bots
Channel Logo

Bot’s the Story, Morning Glory? Uncovering Oasis Ticket Scalper Bots

Netacea bot experts discuss the challenges around the Oasis reunion tour ticket sales, focusing on the issues caused by bots and scalping in high-demand
events. The discussion explores the technical difficulties of managing ticket sales, the tactics used by bot operators to secure tickets, and the broader
implications for the industry. The team also discuss why current methods to prevent bot activity often fail and why a multi-pronged strategy combining real…

Coming up next

Unveiling the Darknet's Malware-as-a-Service model
Channel Logo

Unveiling the Darknet's Malware-as-a-Service model

Not only do cybercriminals make money by committing cybercrime, but they also expand their operations by offering services to individuals without strong
technical skills in malware development. This business model is known as Malware-as-a-Service (MaaS), and it operates on various sites of the "shadow"
internet, including the Darknet. MaaS generates stable profits, enabling cybercriminals to maintain a team and continuously improve their services to carry …

Why Dedicated Bot Management Has Become a Requirement
Channel Logo

Why Dedicated Bot Management Has Become a Requirement

A recent research study from Enterprise Strategy Group found that organizations continue to struggle with a variety of bot-related incidents spanning fraud,
content scraping and manipulation, and account attacks. This variation in sophisticated bot attacks requires advanced capabilities and detection mechanisms,
beyond what most web application firewalls (WAFs) are designed to offer. Join Enterprise Strategy Group Principal Analyst John Grady, Human Senior Direct…

Attend Summits on Botnets

Cyberattaques : anticiper pour être prêt

Cyberattaques : anticiper pour être prêt

Une cyberattaque n'est pas un événement que l'on choisit de vivre. C'est une situation imposée. Face à cela, deux options s'offrent à nous : la prévention,
pour diminuer les risques de survenue d'une cyberattaque et ainsi en retarder l'échéance au maximum ; et la préparation, pour atténuer les conséquences…

|12 sessions
CISO Strategies (APAC Edition)

CISO Strategies (APAC Edition)

With the rise in breaches and cyber crime, organizations around the world face an increased risk of loss, not only to their financial bottom line, but also in
damages to their reputation and customer satisfaction. Discover how CISOs are continually building and implementing their security strategy, and the tools …

|12 sessions

Watch series about Botnets

The BLADE Framework: The MITRE ATT&CK-style Framework for Bot Attacks
2 episodes
Series Company Logo

The BLADE Framework: The MITRE ATT&CK-style Framework for Bot Attacks

Just as security professionals rely on MITRE ATT&CK to help them understand technical vulnerabilities, the BLADE Framework® is a vital learning tool in the
battle against bot attacks like credential stuffing, scraping and scalping. The BLADE Framework is an open-source educational resource describing a wide r…

Watch series

Week in security with Tony Anscombe
51 episodes
Series Company Logo

Week in security with Tony Anscombe

Hear from ESET's Chief Security Evangelist Tony Anscombe about the latest news in cybersecurity

Watch series

ESET Demos
3 episodes
Series Company Logo

ESET Demos

Join us for demos about: ESET PROTECT Platform and MDR, ESET Threat Intelligence, and ESET MSP Environment.

Watch series

ESET Conferences
15 episodes
Series Company Logo

ESET Conferences

A collection of ESET's Tech for Good partner conference recording plus ESET World recordings from our conference in 2024

Watch series

Monthly Threat Brief: The SIG Download
19 episodes
Series Company Logo

Monthly Threat Brief: The SIG Download

Navigating the dynamic landscape of security requires diverse perspectives. Join Akamai's Security Intelligence Group (SIG) in our concise monthly webcast
series, where we decode the most significant threats and cutting-edge research from the past 30 days in just 15 minutes. With insights from over 300 globa…

Watch series

OWASP Top 10: Lightboard Lesson Series
11 episodes
Series Company Logo

OWASP Top 10: Lightboard Lesson Series

The OWASP Top 10 is a broad consensus about the most critical security risks to web applications. The update gives guidance to help secure modern web
applications and architectures from exploits, abuse, and misconfiguration, as well as recommendations for mitigating new risks involving software supply ch…

Watch series