Batton Down the Hatches Against Emotet with AttackIQ Attack Graphs

Emotet continues to be used in wide broad-based attacks against victims in all sectors across the world. In response, AttackIQ has released two new attack graphs emulating recent Emotet campaigns that resulted in data exfiltration and ransomware extortion. These attack graphs will help you to validate security controls, understand incident response processes, and support the improvement of your security posture against an actor who uses both native system tools and their own bespoke malware. Join us to learn how your team can use data generated from continuous testing and the use of attack graphs to achieve key security outcomes, adjust your security controls, and work to elevate your total security program effectiveness against a known and dangerous threat.