案件登録、MDF、セールスおよびマーケティングツール、トレーニングなどがご利用いただけます。
ナレッジベース、コミュニティ、技術文書、ビデオチュートリアルを検索することにより、質問への回答を検索する
Threat actors leverage malware to create backdoors into systems for a few key reasons. These forms of malware, even when they fail, can create serious vulnerabilities in systems.
This webcast will cover the threat landscape and discuss new types of attacks. Come for the news but stay for a live hacking demonstration that will install a backdoor on an unprotected endpoint and later, an attempt on a protected one.
In this webcast you’ll learn:
•The current threat landscape
•What backdoors are
•How to stop backdoors like Calisto
•How to roll back the damage of an attack like ransomware
Thank you for registering for this event. Please keep an eye out for an email from us or the event host with further details. We look forward to seeing you at this event!