Available on-demand
In this webinar, we explore how adversaries use more traditional methods to obtain access to organizations, including the use of TTPs targeting remote access, such as brute-forcing and RDP vulnerability exploits.
We also delve into how prolific malware families such as ZLoader (aka Silent Night) and TA505’s Get2 assist with these activities.
Watch now to gain critical insight into the Nordics Threat Landscape.
Loading form...
Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.