ĢTV

Glitch effect

Watch Your Backdoor: Exposing Vulnerabilities in Your Favorite Apps

Hackers don’t always need fancy malware or zero days to get into an environment—they can simply sneak in through some of your favorite tools and applications.
Glitch effectGlitch effect
Download Your
On-Demand Webinar
By submitting this form, you accept our Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Watch the
Webinar
By submitting this form, you accept our Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Hackers don’t always need fancy malware or zero days to get into an environment—they can simply sneak in through some of your favorite tools and applications.

One moment, you’re updating an app you use every day. Suddenly, your routine update has become a massive vulnerability. Tactics like this can fool even the most experienced IT pros, and often go unnoticed until it's too late. That’s where a SOC steps in.

Join us for an insightful webinar where you’ll:

  • Learn how hackers sneak in through legitimate apps and why it’s such a clever trick.
  • Hear stories ranging from simple to the most sneaky, including a case where the victim couldn’t believe they’d been exposed even after the threat was revealed!
  • See how ĢTV spots these threats and what you can do to lower your chances of getting hit.

It’s going to be a great session with a ton of insights on keeping your endpoints and network safe. Don’t forget to save your seat today—we can’t wait to see you there!

Glitch banner

One moment, you’re updating an app you use every day. Suddenly, your routine update has become a massive vulnerability. Tactics like this can fool even the most experienced IT pros, and often go unnoticed until it's too late. That’s where a SOC steps in.

Join us for an insightful webinar where you’ll:

  • Learn how hackers sneak in through legitimate apps and why it’s such a clever trick.
  • Hear stories ranging from simple to the most sneaky, including a case where the victim couldn’t believe they’d been exposed even after the threat was revealed!
  • See how ĢTV spots these threats and what you can do to lower your chances of getting hit.

It’s going to be a great session with a ton of insights on keeping your endpoints and network safe. Don’t forget to save your seat today—we can’t wait to see you there!

Topics Covered
Incident Response
Attacker Tradecraft
Share
Generic Headshot Profile
Dray Agha
Manage Security Operations Center UK, ĢTV
Linkedin icon
Generic Headshot Profile
James Mason
Product Marketing Manager

Watch Your Backdoor: Exposing Vulnerabilities in Your Favorite Apps

Glitch effectGlitch effectGlitch effect
Share

One moment, you’re updating an app you use every day. Suddenly, your routine update has become a massive vulnerability. Tactics like this can fool even the most experienced IT pros, and often go unnoticed until it's too late. That’s where a SOC steps in.

Join us for an insightful webinar where you’ll:

  • Learn how hackers sneak in through legitimate apps and why it’s such a clever trick.
  • Hear stories ranging from simple to the most sneaky, including a case where the victim couldn’t believe they’d been exposed even after the threat was revealed!
  • See how ĢTV spots these threats and what you can do to lower your chances of getting hit.

It’s going to be a great session with a ton of insights on keeping your endpoints and network safe. Don’t forget to save your seat today—we can’t wait to see you there!

Blurry glitch effect