1. Peony Ballroom 4504

Phishing is back to its glory days! With malware developers moving into closed, ‘not for sale’ rings, we are seeing a rise in the number and sophistication of phishing attacks. In this session presenters will discuss the new wave of phishing attacks, how they bypass current security processes (collected examples will be shown) as well as talk about what SOCs should do to counter such threats.

Learning Objectives:
1: Understand new trends in the threats landscape.
2: Learn from examples how the new phishing attacks are carried out and the tools used.
3: Understand potential defensive strategies.

Download pdf
Participants: