Speaker: Marcelle Lee - CTU Senior Security Researcher
Recorded: March 20, 2020
Duration: 12 Mins
- How threat actors are using Trickbot, Azorult and EMOTET in campaigns
- How a legitimate map from Johns Hopkins became a vehicle for malware
- How threat actors imitate official government departments to succeed
- What to do to stay secure
Threat actors are exploiting COVID-19 to launch more phishing attacks. But there’s no need to panic – with awareness and a few simple security measures, these malicious campaigns can likely be prevented.
View this on-demand webcast as our Counter Threat Unit™ Research Team takes you through the COVID-19 phishing activity they’ve observed and offers advice on how to stay protected. They’ve seen use of well-known malware in the wild, plus some lesser known and unidentified programs. We’ll help you understand the key hallmarks to look out for and share a few steps to help you stay prepared and in control.
View Your On-Demand Webcast
The old approaches to cybersecurity are no longer adequate. It’s time for something new. Layered defenses can create almost as many problems as they solve, and security teams struggle to keep up with the threat. What you need is context across all your layers of defense with the right people, processes, and technology working together in concert. That’s how Secureworks can help. Using 20+ years of industry knowledge, advanced analytics, industry-leading threat intelligence, and the network effect of more than 4,000 customer environments, we provide world-class cybersecurity solutions to customers around the globe. This unmatched experience empowers our customers to be Collectively Smarter. Exponentially Safer.™
Our Managed Detection and Response (MDR) solution is comprehensive, powered by our cloud-native software Red Cloak™ Threat Detection and Response that uses AI and machine learning to deliver better outcomes for your security operations. MDR unifies telemetry from your existing security technology to maximize visibility, reduce complexity, and enable you to move at the speed of the threat. Learn more about how Managed Detection and Response uses contextualized visibility to improve your organization’s security posture.