Recent talks on Botnets


Defenders’ Guide 2025: Fortify the Future of Your Defense
The attack surface is not only getting wider but also deeper - wider as new attack vectors emerge, and deeper as threat actors find new ways to exploit
traditional ones. With the growing use of LLMs and APIs, we can only expect this expansion to continue. That’s why the Akamai SOTI research team created
something new for 2025; a practical, hands-on, highly technical defenders’ guide for those working on the front lines of the digital battlefield. Mapped to th…


Top Malware Threats of February 2025: What You Need to Know
Cloud Storage Security’s internal threat laboratory, Casmer Labs, has been hard at work discovering and identifying the most current and pressing threats to
organizations that operate in the cloud. In February 2025, the top two most popular malware strains that Casmer Labs detected were Mirai, a well-known
botnet malware that targets IoT devices to launch DDoS attacks, and Prometei, a similarly dangerous botnet malware. Join us for this technical talk, where…

Beyond the Noise: ESET’s Curated Threat Intelligence for Proactive Defense
In an era where cyber threats are increasingly sophisticated, corporations must adopt proactive strategies to safeguard their assets. Join our webinar to
discover how ESET's Threat Intelligence can transform your security posture. Unlike most raw telemetry feeds that require extensive processing, ESET offers
highly curated intelligence with low false positive rates and an AI advisor to assist you. Learn how recent research enables ESET's detection engine to block …


Suivre et analyser les activités des botnets pour prévenir les attaques par ransomware
Les botnets cybercriminels constituent un vecteur d'infection majeur dans les attaques par ransomware, causant des dommages significatifs aux
organisations. Surveiller activement les campagnes de distribution et les infrastructures des botnets permet de lutter efficacement contre cette menace. De
plus, une connaissance approfondie des menaces facilite le ciblage et le démantelement des infrastructures malveillantes, comme l'ont démontré les opér…


Advanced AI Strategies for Application Threat Mitigation
As the evolution of digital threats never stops, traditional defenses like geo-blocking and IP reputation services often fall short, leaving critical
industries—government, finance, travel, and hospitality—vulnerable to sophisticated bot attacks. This webinar, hosted by Radware’s CTI Researchers, dives
into the current application threat landscape, exposing the limitations of common defense mechanisms against modern bots and Distributed Denial-of-Servi…


Advanced AI Strategies for Application Threat Mitigation
As the evolution of digital threats never stops, traditional defenses like geo-blocking and IP reputation services often fall short, leaving critical
industries—government, finance, travel, and hospitality—vulnerable to sophisticated bot attacks. This webinar, hosted by Radware’s CTI Researchers, dives
into the current application threat landscape, exposing the limitations of common defense mechanisms against modern bots and Distributed Denial-of-Servi…


Under the Mask: Unveiling ELF Malware and DDoS-as-a-Service
Beneath the surface of the digital landscape, a growing threat is hiding in plain sight. In this revealing session, the Sysdig Threat Research Team will unmask
the insidious world of ELF malware and its role in powering DDoS-as-a-Service botnets. Sysdig Threat Detection Engineer Alessandra Rizzo will take you
through the inner workings of the "Rebirth" botnet, a Mirai variant exploiting vulnerabilities in cloud environments and beyond. Discover how these threats e…


Bot’s the Story, Morning Glory? Uncovering Oasis Ticket Scalper Bots
Netacea bot experts discuss the challenges around the Oasis reunion tour ticket sales, focusing on the issues caused by bots and scalping in high-demand
events. The discussion explores the technical difficulties of managing ticket sales, the tactics used by bot operators to secure tickets, and the broader
implications for the industry. The team also discuss why current methods to prevent bot activity often fail and why a multi-pronged strategy combining real…
Coming up next


Unveiling the Darknet's Malware-as-a-Service model
Not only do cybercriminals make money by committing cybercrime, but they also expand their operations by offering services to individuals without strong
technical skills in malware development. This business model is known as Malware-as-a-Service (MaaS), and it operates on various sites of the "shadow"
internet, including the Darknet. MaaS generates stable profits, enabling cybercriminals to maintain a team and continuously improve their services to carry …

Why Dedicated Bot Management Has Become a Requirement
A recent research study from Enterprise Strategy Group found that organizations continue to struggle with a variety of bot-related incidents spanning fraud,
content scraping and manipulation, and account attacks. This variation in sophisticated bot attacks requires advanced capabilities and detection mechanisms,
beyond what most web application firewalls (WAFs) are designed to offer. Join Enterprise Strategy Group Principal Analyst John Grady, Human Senior Direct…
Attend Summits on Botnets
Cyberattaques : anticiper pour être prêt
Une cyberattaque n'est pas un événement que l'on choisit de vivre. C'est une situation imposée. Face à cela, deux options s'offrent à nous : la prévention,
pour diminuer les risques de survenue d'une cyberattaque et ainsi en retarder l'échéance au maximum ; et la préparation, pour atténuer les conséquences…
CISO Strategies (APAC Edition)
With the rise in breaches and cyber crime, organizations around the world face an increased risk of loss, not only to their financial bottom line, but also in
damages to their reputation and customer satisfaction. Discover how CISOs are continually building and implementing their security strategy, and the tools …
Watch series about Botnets

The BLADE Framework: The MITRE ATT&CK-style Framework for Bot Attacks
Just as security professionals rely on MITRE ATT&CK to help them understand technical vulnerabilities, the BLADE Framework® is a vital learning tool in the
battle against bot attacks like credential stuffing, scraping and scalping. The BLADE Framework is an open-source educational resource describing a wide r…

Week in security with Tony Anscombe
Hear from ESET's Chief Security Evangelist Tony Anscombe about the latest news in cybersecurity

ESET Demos
Join us for demos about: ESET PROTECT Platform and MDR, ESET Threat Intelligence, and ESET MSP Environment.

ESET Conferences
A collection of ESET's Tech for Good partner conference recording plus ESET World recordings from our conference in 2024

Monthly Threat Brief: The SIG Download
Navigating the dynamic landscape of security requires diverse perspectives. Join Akamai's Security Intelligence Group (SIG) in our concise monthly webcast
series, where we decode the most significant threats and cutting-edge research from the past 30 days in just 15 minutes. With insights from over 300 globa…

OWASP Top 10: Lightboard Lesson Series
The OWASP Top 10 is a broad consensus about the most critical security risks to web applications. The update gives guidance to help secure modern web
applications and architectures from exploits, abuse, and misconfiguration, as well as recommendations for mitigating new risks involving software supply ch…