BEGIN:VCALENDAR
PRODID:-//Microsoft Corporation//Outlook 12.0 MIMEDIR//EN
VERSION:2.0
METHOD:PUBLISH
X-MS-OLK-FORCEINSPECTOROPEN:TRUE
BEGIN:VEVENT
CLASS:PUBLIC
CREATED:20260416T191937Z
DESCRIPTION:The recent discovery of the Chrysalis backdoor - delivered through a compromise of Notepad++ update infrastructure - offers a clear look at how modern nation-state attackers are evolving their supply chain tradecraft.\nIn this session, Rapid7 Senior Director of Threat Analytics Christiaan Beek and Steve Edwards, Director of Threat Intelligence & Detection Engineering (TIDE), break down what really happened in the Chrysalis campaign, why it matters beyond Notepad++, and what defenders should do next. Understand how the attackers were able to maintain access for months without triggering widespread detection by selectively delivering a custom backdoor linked to the Lotus Blossom APT.\nAttendees will walk away with a practical understanding of this attack, concrete steps to assess exposure, and guidance on how to strengthen detection and response strategies against increasingly patient, selective supply chain threats.\n
DTSTART:20260206T000000
DTEND:20260206T010000
DTSTAMP:20260416T191937Z
LOCATION:Online
PRIORITY:5
SEQUENCE:0
SUMMARY;LANGUAGE=es-es:Tecnowebinars.com - :: [APJ] Inside Chrysalis: Lessons from the Notepad++ Backdoor and the New Reality of Supply Chain Attacks
TRANSP:OPAQUE
UID:8dd12eda42a18c4d0bf59482af7e4a91 Tecnowebinars.com
X-MICROSOFT-CDO-BUSYSTATUS:BUSY
X-MICROSOFT-CDO-IMPORTANCE:1
X-MICROSOFT-DISALLOW-COUNTER:FALSE
X-MS-OLK-ALLOWEXTERNCHECK:TRUE
X-MS-OLK-AUTOFILLLOCATION:FALSE
X-MS-OLK-CONFTYPE:0
BEGIN:VALARM
TRIGGER:-PT1440M
ACTION:DISPLAY
DESCRIPTION:Reminder
END:VALARM
END:VEVENT
END:VCALENDAR
