Threat Hunting For Novel Malware Activities
In the evolving landscape of cybersecurity, traditional "out of the box" solutions and Indicator of Compromise (IOC) functionalities often fall short in addressing novel malware threats and post-exploitation activities.
In this webinar we will we will share with you advanced techniques for uncovering and mitigating sophisticated cyber threats.
This talk will delve into real-world tips and methodologies for hunting and investigating novel malware activities. We will explore the intricacies of on-the-fly log parsing and nested field analysis, showcasing how these skills are essential in detecting subtle and obfuscated attacker behaviors.
Participants will learn the process of reassembling egress streams to reconstruct attacker communications and exfiltration strategies, as well as decoding complex attacker payloads to understand the full scope of the threat.
By attending this session, attendees will gain valuable insights into proactive threat-hunting strategies that go beyond conventional security measures.
We will demonstrate how to effectively identify and respond to novel attacks, emphasizing the importance of a dynamic and thorough approach to cybersecurity.
Webinar duration: 45 minutes