Watering Hole Attacks

About this video training:

Recently, experts have discovered a critical vulnerability called “Log4j”. This vulnerability could potentially allow attackers to access entire networks, infect systems with malware, run any code, delete or encrypt files, and gain access to data.

This training covers one of the techniques hackers could use to exploit it: “watering hole attacks.” With this type of attack, hackers identify websites most often used by a group, organization, or industry and infect them with malware.

Please complete this training as soon as possible. We hope you enjoy it!

Lesson