Threat Detection and Hunting for Common MITRE ATT&CK Techniques

Ғылым және технология

In this webinar, LogRhythm threat detection research engineers join Ultimate Security Windows Host Randy Franklin Smith to zero in on the new standard to assess the effectiveness of your security monitoring and alerting capabilities - the MITRE ATT&CK framework.
The presenters will explore the most common techniques from the MITRE ATT&CK framework, demonstrate how attackers use them, and show you how you can use them to detect and respond to threats across the entire threat lifecycle. The five techniques that will be covered include:
1. Connection Proxy
2. Exfiltration Over Alternative Protocol
3. Masquerading
4. Drive-by Compromise
5. Service Execution

Пікірлер: 7

  • @cgovea10
    @cgovea103 жыл бұрын

    Great explanation, great video, appreciated thank you.

  • @Tekionemission
    @Tekionemission Жыл бұрын

    (16:22)-Resources. Python Attack Client and Stix2 Library (34:17)-Masquerading Demo (1:12:27)-Registry Key/Startup and Schedule Tasks

  • @worldneedsdaftpunk7553
    @worldneedsdaftpunk7553 Жыл бұрын

    Can you please provide the link to the first LogRhythm MITRE ATT&CK recording that you spoke of at the beginning. Thank you.

  • @mylearnings910
    @mylearnings9102 жыл бұрын

    @7:30

  • @AshishYadav-gz3jq
    @AshishYadav-gz3jq10 ай бұрын

    Ok

  • @heufenaugen1745
    @heufenaugen1745 Жыл бұрын

    That audio though 🤕

  • @MrEmityushkin
    @MrEmityushkin2 жыл бұрын

    +

Келесі