COVID-19 Threat Intelligence Briefing
An Update on the COVID-19 Threat Landscape
As the world works to prevent the spread of the COVID-19 virus, cyber adversaries are only working harder — opportunistically trying to take advantage of global disruption with this new cyberattack vector. CrowdStrike® Intelligence closely monitors this adversary activity and is observing spikes in ongoing coronavirus-themed phishing attacks and scam campaigns.
In this webcast, CrowdStrike exposes the threat actors that are attempting to exploit the confusion caused by COVID-19 and outlines the adversaries’ motivation, tactics and techniques. Armed with this information, you will learn how to identify COVID-19-themed threats, be better able to educate users and more effectively deploy proactive security measures.
Join CrowdStrike Vice President of Intelligence Adam Meyers as he offers insights into how threat actors are actively taking advantage of COVID-19 to infiltrate organizations and achieve their objectives.
Attend this webcast to learn:
- How threat actors are exploiting COVID-19 — their motivation and intent
- The latest tactics, techniques and procedures adversaries are using to reach their objectives
- The sectors and geographical regions being targeted by COVID-19 exploits
- Steps you can take to proactively address these emerging threats
Click hereto register!
You might also like
Corelight’s Online CTF with iON
Corelight’s popular Capture the Flag (CTF) events have gone digital to support our new work-from-home world. We’re excited to host a private, virtual CTF competition on behalf of iON.Participants can hunt for the CTF crown from the comfort of their home, racing to beat other players and answer dozens of security challenges using Zeek data…
To Zoom or Not to Zoom
NOTE: iON’s April 20 Update to this blog entry follows after the conclusion. As organizations try to maintain operations with most of their employees working from home to minimize the spread of Covid-19, Zoom Video Communications has experienced an explosive increase in usage. By late February, the company had already added 2.2 million new users, surpassing their total number of new users for all of 2019, while their number of daily users has…
Securing Remote User Access to Critical Internal Systems
Remote users – both employees and vendors – typically need access to critical systems to manage data, patch or upgrade systems, etc., in order to keep business operations running smoothly. A quick review of known 2019 data breaches shows both a sharp increase in third party breaches and in the amount of records exposed.Organizations now…