Yep, it’s EDR on EDR violence.
Learn how they’re doing it & how to fight back: youtu.be/CbD8b3h4me4
#CyberSecurity #EDR #BlueTeam #Infosec #ThreatIntel #PurpleTeam #BYOVEDR
Yep, it’s EDR on EDR violence.
Learn how they’re doing it & how to fight back: youtu.be/CbD8b3h4me4
#CyberSecurity #EDR #BlueTeam #Infosec #ThreatIntel #PurpleTeam #BYOVEDR
🎥 Watch now: youtu.be/-3PpxuKP7wQ
#TheWeeklyPurpleTeam #GoldenDMSA #PurpleTeam #RedTeam #BlueTeam #CyberSecurity #DFIR #WindowsSecurity
🎥 Watch now: youtu.be/-3PpxuKP7wQ
#TheWeeklyPurpleTeam #GoldenDMSA #PurpleTeam #RedTeam #BlueTeam #CyberSecurity #DFIR #WindowsSecurity
We deep dive BadSuccessor
See how the attack works + how to detect it in the real world.
🎥 youtu.be/IWP-8IMzQU8
🔍 Based on research by @Akamai
#PurpleTeam #BadSuccessor #ActiveDirectory #RedTeam #BlueTeam #CyberSecurity #DetectionEngineering
We deep dive BadSuccessor
See how the attack works + how to detect it in the real world.
🎥 youtu.be/IWP-8IMzQU8
🔍 Based on research by @Akamai
#PurpleTeam #BadSuccessor #ActiveDirectory #RedTeam #BlueTeam #CyberSecurity #DetectionEngineering
youtu.be/d06oveNhIYo
youtu.be/d06oveNhIYo
This week’s “The Weekly Purple Team” episode discusses data bouncing. Bouncing data off legitimate servers for exfiltration
Learn more & stay ahead of the threat: 🎥 Watch here youtu.be/oMmB7mi7KRk
#CyberSecurity #Infosec
This week’s “The Weekly Purple Team” episode discusses data bouncing. Bouncing data off legitimate servers for exfiltration
Learn more & stay ahead of the threat: 🎥 Watch here youtu.be/oMmB7mi7KRk
#CyberSecurity #Infosec
youtu.be/Jzm2vzhEANM
youtu.be/Jzm2vzhEANM
youtu.be/btAUBgeUiAg
youtu.be/btAUBgeUiAg
The project is Amnesiac github.com/Leo4j/Amnesiac.
The project is Amnesiac github.com/Leo4j/Amnesiac.
youtu.be/RgSGjn_Z1dg
youtu.be/RgSGjn_Z1dg
Yes, and it’s a growing threat. Multifactor phishing involves techniques like stealing credentials and session tokens through MiTM phishing attacks. Let me show you how attackers do this!
youtu.be/CNyzGUY3Ujk
Yes, and it’s a growing threat. Multifactor phishing involves techniques like stealing credentials and session tokens through MiTM phishing attacks. Let me show you how attackers do this!
youtu.be/CNyzGUY3Ujk
youtu.be/onSQdTnWVJg
youtu.be/onSQdTnWVJg