Unit42 SolarStorm
Threat Briefing

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

How to navigate the SolarStorm attack

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

Navigating the SolarStorm attack

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

As all of you are aware, on December 13th SolarWinds announced that hackers had inserted malware into a service that provides software updates for its Orion platform. Our clients continue reaching out to learn more in regards to the recent breach.

We recently held an information session with Ryan Olson, leader of Palo Alto Networks Unit 42 Threat Research team. View the recording to learn more about:

  • What effective countermeasures you can take today to help protect your organization
  • What we currently know about the attack
  • What Palo Alto Networks is offering to help our customers in the spirit of our mission which is to protect our digital way of life 



SPEAKER

  Ryan Olson

Vice President of Threat Intelligence,
Palo Alto Networks


Ryan Olson is the Vice President of Threat Intelligence for Palo Alto Networks. He leads Unit 42, a team responsible for collection, analysis and production of intelligence on adversaries targeting organizations around the world. His area of expertise is detecting and identifying actors and groups conducting cyber-crime and cyber-espionage operations. Ryan is a contributing author to the book Cyber Fraud: Tactics, Techniques and Procedures, and primary author of Cyber Security Essentials. Ryan is a named inventor on two patents related to malware analysis and threat intelligence collection.

*SolarStorm is the name we assigned to the recent campaign of attacks connected to a suspected nation state actor behind the SolarWinds SUNBURST malware.

LP-3 Sec 1 Content
LP-3 Sec 1 Content
LP-3 Sec 1 Content
LP-3 Sec 1 Content
LP-3 Sec 1 Content
LP-3 Sec 1 Content
LP-3 Sec 1 Content
LP-3 Sec 1 Content
LP-3 Sec 1 Content
LP-3 Sec 1 Content

View the briefing webinar

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME