A threat actor has crafted and sent a spear-phishing email with what appears to be a trustworthy link to the site of a conference that an employee recently attended. The employee clicked the link and was redirected to a malicious site through which the employee downloaded a PDF attachment infected with ransomware. The employee opened the attachment, which exploited vulnerabilities on the desktop. The ransomware is now installed and is calling back to its command and control server. Which security solution is needed at this stage to mitigate the attack?
hiro3316
3 weeks, 6 days ago27ea763
4 months, 4 weeks agoTrainingTeam
8 months agobpetro_12
1 year, 1 month agoDrVoIP
2 years, 4 months agoETSec
2 years, 5 months agojaciro11
2 years, 9 months agoETSec
2 years, 5 months ago