Join Unit 42, the Palo Alto Networks threat intelligence team, for a special session on Scarlet Mimic. Our Cybersecurity experts spend the last 7 months researching this prolific cyber espionage campaign, with malicious activity stretching back 4 years. Targets range from human rights activists, government organizations, and academic institutions in multiple countries. We will detail Scarlet Mimics’ attack methodology, including the sophisticated tools, techniques, and methods employed by the adversary. Using this information, you can ensure your organization is not at risk, and employs new security controls to prevent future related attacks.
Register today in order to:
• Understand the attack campaign flow.
• Review the targets and who is at risk.
• Deep dive into the malware and other tools used.
• Indicators and strategies for prevention.