Latest Blog / How Scary is that Data Leak, Really? According to Cyber Threat Intelligence, You Might Be Able to Sleep Easy

Read more

Resource

Webinar: Conti Leaks Overview

with Victoria Kivilevich, KELA’s Director of Threat Research

play

Please fill out the form to watch

Fill Out The Form To Watch Now!

Watch this Webinar to learn more about:

What really led to the formation of the modern Conti operation?
Malware and cybercrime tools used by Conti ransomware gang.
Leaked information about Conti's attacks’ process, including multiple steps before and after the ransomware deployment.
KELA's Research team review of top-15 threat actors of the Conti's group