Get Started
Loading Events
This event has passed.

This scenario begins with a phishing attack where an unsuspecting employee receives an Trojan-infected email for a legitimate source. The Trojan is executed with user privileges, motivating the attacker to determine a path to privilege escalation. In this complex attack, participants will use advanced detection and prevention techniques to mitigate the scenario before significant data is exfiltrated from the environment.

Share This Story, Choose Your Platform!

Go to Top