accent 1 accent 2
Icon-Check@3x
Virtual Connect! Replay

Trick or Treat: Defending Against Today's Spookiest Malware👻

On-Demand

Mummy Spider. Gh0st Rat. Gothic Panda. 

If these threat actor names don't scare you, the malware they deploy should! 

Join us for a lesson in threat actor naming and a deep look into how the spookiest malware on the planet operates.  

 
Replay

Watch Now

About this webinar...

This webinar features today’s spookiest malware. We’ll cover how different threat actors and malware strains get their names, how they evade detection and infiltrate your network, and how Varonis finds and alerts on early indications of compromise. 

What you'll learn...

  • The meaning behind threat actor names 
  • Common tactics, techniques, and procedures of ransomware gangs 
  • What to look out for with Emotet malware 
  • The importance of a data-centric view for detecting malware 

 



 

Snir Ben Shimol
Snir Ben Shimol Director of Cybersecurity, Varonis
Brian Vecci_circle
Brian Vecci Field CTO, Varonis
Headshot_DavidGibson_SQ-1
David Gibson Chief Marketing Officer, Varonis

The moment Varonis detects signs of an attack, it immediately kicks the affected user off of the network and stops the attack. 

Chief Security Officer, U.S. County

Want to see Varonis in action?

Request a demo