Speaker: Marcelle Lee - CTU Senior Security Researcher
Recorded: March 20, 2020
Duration: 12 Mins
You’ll learn:
- How threat actors are using Trickbot, Azorult and EMOTET in campaigns
- How a legitimate map from Johns Hopkins became a vehicle for malware
- How threat actors imitate official government departments to succeed
- What to do to stay secure
Threat actors are exploiting COVID-19 to launch more phishing attacks. But there’s no need to panic – with awareness and a few simple security measures, these malicious campaigns can likely be prevented.
View this on-demand webinar as our Counter Threat Unit™ Research Team takes you through the COVID-19 phishing activity they’ve observed and offers advice on how to stay protected. They’ve seen use of well-known malware in the wild, plus some lesser known and unidentified programs. We’ll help you understand the key hallmarks to look out for and share a few steps to help you stay prepared and in control.