Emergency Incident ResponseReport a Confirmed or Potential Breach? Call +1 770-870-6343
0 Results Found
              Back To Results

                COVID-19: Viral In More Ways Than One

                Watch the webcast to learn how threat actors are exploiting fear during the pandemic

                COVID-19: Viral In More Ways Than One
                Speaker: Marcelle Lee - CTU Senior Security Researcher
                Recorded :
                Duration: 12 mins

                Threat actors are exploiting COVID-19 to launch more phishing attacks. But there’s no need to panic –with awareness and a few simple security measures, these malicious campaigns can likely be prevented.

                View this on-demand webcast as our Counter Threat Unit™ Research Team takes you through the COVID-19 phishing activity they’ve observed and offers advice on how to stay protected. They’ve seen use of well-known malware in the wild, plus some lesser known and unidentified programs. We’ll help you understand the key hallmarks to look out for and share a few steps to help you stay prepared and in control.

                You’ll learn:

                • How threat actors are using Trickbot, Azorult and EMOTET in campaigns
                • How a legitimate map from Johns Hopkins became a vehicle for malware
                • How threat actors imitate official government departments to succeed
                • What to do to stay secure

                Like what you're reading?
                Just a few questions to get started


                Select Role:

                • Board of Directors
                • CEO / CFO / COO
                • CISO / CSO
                • CIO / CTO
                • IT / IS / Security VP/Director
                • IT / IS / Security Manager
                • IT / IS / Security Staff
                • IT / IS / Non-Security
                • Risk / Legal / Compliance / Finance
                • Sales / Marketing
                • Press / Industry Analyst
                • Student

                Select Country:

                • Select an item

                Select State:

                • Select an item

                Select Annual Revenue:

                • ≥ $500M
                • $100-$499M
                • ≤ $100M

                Select Industry:

                • Banking
                • Business Services
                • Credit Union
                • Education
                • Finance
                • Government
                • Health Care (Non-Hospital)
                • Heavy Industry
                • Hospitality
                • Hospitals
                • Insurance
                • Legal
                • Manufacturing
                • Media
                • Membership Organizations
                • Retail
                • Technology
                • Telecom
                • Transportation
                • Utilities
                • Other

                Current Security Environment?:

                • Managing In-House
                • Managing Externally (3rd Party)
                • Blended Model (In-house and 3rd Party)
                • Not sure

                Select Next Security Initiative Timeframe:

                • 0-3 months
                • 3-6 months
                • 6-12 months
                • 12-24 months

                Select Our Greatest Security Challenge:

                • Securing the Cloud
                • Assessing security posture
                • Optimizing Security Operations
                • Protecting critical assets
                • Meeting & maintaining compliance
                • Preventing a data breach
                • Access to actionable security intelligence
                • Access to security expertise
                • Preparing & responding to an incident

                Interested in learning more

                Currently Looking for Assistance With (Select all that Apply)

                Select Best time to call:

                • Early morning (8-10am EST)
                • Late morning (10am-12pm EST)
                • Early afternoon (12-3pm EST)
                • Late afternoon (3-5pm EST)

                Secureworks News :

                Related Content