Breach Prevention Week: Part 4

Ryan discusses Operation Lotus Blossom and how the probable-espionage attacks were delivered via a customized backdoor, Elise. Learn how to recognize the difference between espionage and everyday malware, and find out how context, actionable data, and informed decisions can help keep your organization safe from targeted attacks.

Stay two steps ahead of threats

As a member we will keep you informed. Get exclusive invites to events, Unit 42 threat alerts, and the latest cybersecurity tips.