As Part of the Magecart Webinar Series
Inside and Beyond MAgecart
What You Need to Know to be Protected From Attacks
Thursday April 30, 2020
1:00pm ET (10:00am PT)
Magecart attacks can be difficult to detect as its malicious script resides on the client-facing side of the website, waiting to skim off any personal information when a customer is at the checkout. Once a website is infected, the payment card information is harvested without the merchant or consumer being aware that the information has been compromised.
Register for this webinar and learn:
- Anatomy of Magecart Attacks
- Strategies on how to hunt malicious attackers
- What happened during major public breaches, and what it means for hundreds of other e-commerce sites
- The newest research that will better define the scope of Magecart’s influence
Jacob Pimental, Senior Incident Response Analyst at T. Rowe Price
Jacob prides himself on being a self-taught reverse engineer. He studied at RIT before being hired by T. Rowe Price as a Senior CyberSecurity Analyst at the BSidesCharm Hiring Village in his sophomore year. Jacob recently discovered an attack on an Olympics Ticketing reseller website in addition to being cited for finding MageCart activity on 60+ E-commerce websites with his work prominently noted by RiskIQ and Graham Cluley. In his free time Jacob runs the blog GoggleHeadedHacker, where he publishes malware analysis reports and Reverse Engineering tutorials.
Matthew McGuirk, Solutions Architect at Source Defense