Cymulate Threat Research Lab Update: September 2023

Logo
Presented by

Mike DeNapoli, Cybersecurity Architect @Cymulate and Dan Lisichkin, Threat Intelligence Expert & Infosec Researcher @Cymulate

About this talk

Each month, we'll dive into the attacker tools emerging as the most prolific and highest risk in the threat landscape. We'll showcase a few that stand out from our continuous examination of the threat landscape and research performed by our highly experienced and diverse researchers. We'll evaluate how these tools work, the phases of intrusion, the threat actor profile (who did it, motivations, origin, why they chose their targets), and how the attack propagated. Furthermore, we’ll provide clear demonstrations of how we detected and replicated the attack propagation using the advanced capabilities of the Cymulate platform.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (129)
Subscribers (16785)
Cymulate exposure management and security validation drives continuous threat exposure management programs and supports both the technical and business requirements of scoping, discovery, prioritization, validation, and mobilization.