The findings show that some threat actors are still employing macro-based malware despite Microsoft disabling the feature by default in Office files downloaded from the web.
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks targeting state institutions in the country as part of an espionage campaign.
The rapid rate of change for many threat actors suggests they have the time, capability, and understanding of the threat landscape to rapidly develop and execute new techniques.
This chapter concludes with a keynote on Deception can detect advanced threats, stop lateral movement, and enhance your Zero Trust strategy.
The theme of this chapter is zero trust + Deception.
It will focus on how deception can help you to outsmart malicious actors using advanced threats.
๐ Feeling the vibes?
Keep the good energy going by checking out my Amazon affiliate link for some cool finds! ๐๏ธ
If not, consider contributing to my caffeine supply at Buy Me a Coffee โ๏ธ.
Your clicks = cosmic support for more awesome content! ๐๐
Leave a Reply