#1665044: Key Insights from the New LevelBlue Threat Trends Report

Description: Join us for a live webinar on key takeaways from the first edition of LevelBlue’s biannual Threat Trends Report! Hear experts from our security operations and threat intelligence teams share insights and actionable guidance on threat activity observed in the second half of 2024, including:
Detailed analysis of a new RaccoonO365 Phishing-as-a-Service kit
Attacker tactics observed in 12 hands-on-keyboard attacks
Top malware families seen across the LevelBlue customer base, including Cobalt Strike, DarkComet, SocGholish, Gootloader, and Lumma Stealer
More info: https://app.info.levelblue.com/e/es?s=1086385399&e=79569&elqTrackId=efd74c1a1b7a40299e524d6e5aa03bea&elq=b0a8f80bc2c8411dbd15962c3451ba3f&elqaid=2138&elqat=1&elqak=8AF523D523268BBB519B1542141ECA55D8C3AC275B023C7E8E9C9870D65CD0254762

Date added Feb. 5, 2025, 6:23 p.m.
Source levelblue
Subjects
  • China - APT19 / APT-19 / Codoso Team / Sunshop Group - use Cobalt Strike/Cobaltstrike, Cobalt Strike Beacon, BeaconLoader
  • Cobalt Strike - Adversary Simulation and Red Team Operations Software
  • DarkComet RAT
  • Hades Locker Ransomware / Gold Winter / SocGholish malware / MafiaWare666 / Jcrypt / RIP Lmao / BrutusptCrypt / TA569
  • Lumma Stealer Malware
  • Phishing News and background Information
  • PodCasts / Webcast / Webinar / eSummit / Virtual Event etc.
  • Russia - GootBot / Gootkit Trojan / Gootloader
Venue Feb. 12, 2025, midnight - Feb. 12, 2025, midnight