Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

Threat Hunting Summit Virtual Event NOW LIVE

SecurityWeek’s 2022 Threat Hunting Summit is now LIVE! (View agenda)

SecurityWeek’s 2022 Threat Hunting Summit is now LIVE! (View agenda)

Join us now in the 3D virtual platform to learn about innovative strategies and tools that security teams can use to detect, contain, and eliminate threats in enterprise networks. The first session goes live at 11AM ET.

Threat Hunting Summit - Virtual Event

Today’s Sessions Include:

● Fireside Chat With Steve Mancini, Guardant Health

● Understanding the Full BEC Attack Cycle Using Active Defense

● Stop the Danger Within: Detect Insider Threats with Endpoint Telemetry

● What to Automate First in Your SOC

● Panel: A Practical Approach to Defending the Enterprise

Advertisement. Scroll to continue reading.

● Analysis of a Mercenary Group and Their Role in the Threat Landscape

● Demos and Technical Sessions

Login now to learn how continually monitoring with a fine-tuned threat hunting strategy can help incident response teams detect attacks that may have bypassed enterprise defenses and reduce attacker dwell time.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Incident Response

Microsoft has rolled out a preview version of Security Copilot, a ChatGPT-powered tool to help organizations automate cybersecurity tasks.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.

Incident Response

Meta has developed a ten-phase cyber kill chain model that it believes will be more inclusive and more effective than the existing range of...

Cloud Security

VMware described the bug as an out-of-bounds write issue in its implementation of the DCE/RPC protocol. CVSS severity score of 9.8/10.