Finding Beacons in the Dark - a guide to stopping Cobalt Strike attacks

Logo
Presented by

Jonathan Jackson - Director Sales Engineering APJ

About this talk

Cobalt Strike (CS) is the most widely used advancend adversary simulation and threat emulation software. It's very powerful, for both good and bad actors. CS delivers a post-exploitation framework that was developed to emulate the greatest features of late-stage malware ecosystems and allow its users to simulate adversary actions. The adoption of Cobalt Strike by global threat actors, and the framework’s use in hundreds of genuine intrusions, ransoms, and data breaches, shows that Beacon has fought its way to the top. It currently sits on the throne as the reigning champ of all malware toolkits. If it works, it wins The session will demonstrate how the security and threat intelligence community can proactively prevent their organisations from falling victim to the growing threat of Cobalt Strike Beacons and Team Servers. Learn how to turn the tables on APT groups and malicious threat actors - become the hunter instead of the hunted.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (31)
Subscribers (3746)
BlackBerry is a leader in the areas of endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.