The webinar discusses the importance of securing email communications from cyber threats in organizations. Various methods, including employee education, process improvement, and role-based tools, are suggested to prevent phishing attacks. Care must be taken not to hinder the delivery of legitimate emails. Speakers include leaders from Penn Medicine, Renown Health, and Mimecast.

Sandworm Uses SSH-over-Tor Tunnel for Stealthy Long-Term Persistence
A significant evolution in Sandworm (APT-C-13) tradecraft, revealing the group’s use of SSH-over-Tor tunneling to achieve long-term, covert persistence inside targeted networks. Sandworm, also known


