Kaspersky researchers have been monitoring the activity of APT actors, cybercriminals and hacktivists currently involved in the conflict in Ukraine. During this webinar, the Global Research and Analysis Team (GReAT) will share their findings on the most recent cyberattacks targeting Ukraine and present their observations, analysis and top findings.
- The types of attacks that have been targeting Ukraine for the past few months
- The results of analysis on destructive attacks and malware (HermeticWiper, etc...)
- How organizations can defend themselves against cyberattacks
GReAT, Kaspersky’s Global Research and Analysis Team, consists of 40 researchers based around the world that work on uncovering APTs, cyberespionage campaigns, major malware, ransomware and underground cybercriminal trends across the world.
In this presentation, you will see what is Ethical Hacking, the purpose of Ethical Hacking, who is an Ethical Hacker, and the various Ethical Hacking certifications. With the rise in the number of cybercrimes, it is necessary for companies to hire Ethical Hackers to protect their networks and data. Here you will have a look at the five different Ethical Hacking certifications, namely Certified Ethical Hacker (CEH), Global Information Assurance Certification Penetration Tester (GPEN), Offensive Security Certified Professional (OSCP), CompTIA Pentest+ and Licensed Penetration Tester(LPT). We will talk about each of these certifications individually and have a look at their description, requirements to take up the certification, the exam fees, the exam duration, and finally, the average annual salary of a candidate with these certifications.
Below topics are explained in this Ethical Hacking certifications presentation:
1. What is Ethical Hacking?
2. Purpose of Ethical Hacking
3. Who is an Ethical Hacker?
4. Ethical Hacking certifications
5. CEH (Certified Ethical Hacker)
6. Global information assurance certification penetration tester (GPEN)
7. Offensive security certified professional (OSCP)
8. CompTia PenTest+
9. Licensed penetration tester (LPT)
This Certified Ethical Hacker-Version 10 (earlier CEHv9) course will train you on the advanced step-by-step methodologies that hackers actually use, such as writing virus codes and reverse engineering, so you can better protect corporate infrastructure from data breaches. This ethical hacking course will help you master advanced network packet analysis and advanced system penetration testing techniques to build your network security skill-set and beat hackers at their own game.
Why is the CEH certification so desirable?
The EC-Council Certified Ethical Hacker course verifies your advanced security skill-sets to thrive in the worldwide information security domain. Many IT departments have made CEH certification a compulsory qualification for security-related posts, making it a go-to certification for security professionals. CEH-certified professionals typically earn 44 percent higher salaries than their non-certified peers. The ethical hacking certification course opens up numerous career advancement opportunities, preparing you for a role as a computer network defence (CND) analyst, CND infrastructure support, CND incident responder, CND auditor, forensic analyst, intrusion analyst, security manager, and other related high-profile roles.
Learn more at https://www.simplilearn.com/cyber-security/ceh-certification
Window ağlarda saldırganların yatay hareketleri ve bunların tespiti konusunda düzenlediğimiz webinarda kullanılan sunumdur.
Amacımız saldırı ve savunma tarafının bakış açılarını bir arada sunmaktı.
Siber saldırıların tespitinde ve olay müdahalesinde Windows sistemlerin logları bize önemli bilgiler verir. Sistemin ilk ele geçirildiği andan başlayarak siber saldırganların yerel ağda yayılmasına kadar pek çok adıma bu loglar üremektedir.
Webinarda aşağıdaki konuları ele aldık:
1- Siber Ölüm Zinciri: Siber saldırıların 7+1 adımı
2- Yatay hareket (lateral movement): Siber saldırganların yerel ağdaki davranışları
3- Fidye yazılımlardaki rolü: Fidye yazılımların yerel ağda yayılmak için kullandığı teknikler
4- Yaşanılan senaryolardan örnekler
5- Yatay hareket için kullanılan araçlar: Siber saldırganlar tarafından kullanılan araçlar
6- Windows Event Logs: Yatay hareketleri tespit etmek için kullanılabilecek loglar
7- LogonTracer Aracı: Log analizini kolaylaştıracak ücretsiz bir araç
8- Olay tespiti ve müdahalesinde Microsoft Advanced Threat Analytics (ATA) aracı kullanımı
9- Yatay hareket tespiti için öneriler
================
Sorularınız için sparta@sparta.com.tr
One of the major challenges when using security monitoring and analytics tools is how to deal with the high number of alerts and false positives. Even when the most straightforward policies are applied, SIEMs end up alerting on far too many incidents response that are neither malicious nor urgent.
Visit - https://siemplify.co
** CyberSecurity Certification Training: https://www.edureka.co/cybersecurity-certification-training **
This Edureka tutorial on "Cybersecurity Frameworks" will help you understand why and how the organizations are using the cybersecurity framework to Identify, Protect and Recover from cyber attacks.
Cybersecurity Training Playlist: https://bit.ly/2NqcTQV
Pardus Kurulumu
PARDUS, Debian GNU/Linux [1] temelli açık kaynak kodlu bir işletim sistemidir. İnternet üzerinden ücretsiz olarak indirilebilmekte ve kolay kurulabilmektedir. Kişisel veya kurumsal kullanımlar için Pardus’un rekabet edebilir ve sürdürülebilir bir işletim sistemi haline getirilmesi için TÜBİTAK ULAKBİM bünyesinde geliştirme ve idame çalışmaları devam ettirilmektedir.
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...Edureka!
**Cybersecurity Training: https://www.edureka.co/cybersecurity-certification-training **
This Edureka "Ethical Hacking Course" PPT will give you an expansive view into Ethical Hacking. This video will give you an exhaustive understanding on key topics of Ethical Hacking for beginners!
Follow us to never miss an update in the future.
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
In this presentation, you will see what is Ethical Hacking, the purpose of Ethical Hacking, who is an Ethical Hacker, and the various Ethical Hacking certifications. With the rise in the number of cybercrimes, it is necessary for companies to hire Ethical Hackers to protect their networks and data. Here you will have a look at the five different Ethical Hacking certifications, namely Certified Ethical Hacker (CEH), Global Information Assurance Certification Penetration Tester (GPEN), Offensive Security Certified Professional (OSCP), CompTIA Pentest+ and Licensed Penetration Tester(LPT). We will talk about each of these certifications individually and have a look at their description, requirements to take up the certification, the exam fees, the exam duration, and finally, the average annual salary of a candidate with these certifications.
Below topics are explained in this Ethical Hacking certifications presentation:
1. What is Ethical Hacking?
2. Purpose of Ethical Hacking
3. Who is an Ethical Hacker?
4. Ethical Hacking certifications
5. CEH (Certified Ethical Hacker)
6. Global information assurance certification penetration tester (GPEN)
7. Offensive security certified professional (OSCP)
8. CompTia PenTest+
9. Licensed penetration tester (LPT)
This Certified Ethical Hacker-Version 10 (earlier CEHv9) course will train you on the advanced step-by-step methodologies that hackers actually use, such as writing virus codes and reverse engineering, so you can better protect corporate infrastructure from data breaches. This ethical hacking course will help you master advanced network packet analysis and advanced system penetration testing techniques to build your network security skill-set and beat hackers at their own game.
Why is the CEH certification so desirable?
The EC-Council Certified Ethical Hacker course verifies your advanced security skill-sets to thrive in the worldwide information security domain. Many IT departments have made CEH certification a compulsory qualification for security-related posts, making it a go-to certification for security professionals. CEH-certified professionals typically earn 44 percent higher salaries than their non-certified peers. The ethical hacking certification course opens up numerous career advancement opportunities, preparing you for a role as a computer network defence (CND) analyst, CND infrastructure support, CND incident responder, CND auditor, forensic analyst, intrusion analyst, security manager, and other related high-profile roles.
Learn more at https://www.simplilearn.com/cyber-security/ceh-certification
Window ağlarda saldırganların yatay hareketleri ve bunların tespiti konusunda düzenlediğimiz webinarda kullanılan sunumdur.
Amacımız saldırı ve savunma tarafının bakış açılarını bir arada sunmaktı.
Siber saldırıların tespitinde ve olay müdahalesinde Windows sistemlerin logları bize önemli bilgiler verir. Sistemin ilk ele geçirildiği andan başlayarak siber saldırganların yerel ağda yayılmasına kadar pek çok adıma bu loglar üremektedir.
Webinarda aşağıdaki konuları ele aldık:
1- Siber Ölüm Zinciri: Siber saldırıların 7+1 adımı
2- Yatay hareket (lateral movement): Siber saldırganların yerel ağdaki davranışları
3- Fidye yazılımlardaki rolü: Fidye yazılımların yerel ağda yayılmak için kullandığı teknikler
4- Yaşanılan senaryolardan örnekler
5- Yatay hareket için kullanılan araçlar: Siber saldırganlar tarafından kullanılan araçlar
6- Windows Event Logs: Yatay hareketleri tespit etmek için kullanılabilecek loglar
7- LogonTracer Aracı: Log analizini kolaylaştıracak ücretsiz bir araç
8- Olay tespiti ve müdahalesinde Microsoft Advanced Threat Analytics (ATA) aracı kullanımı
9- Yatay hareket tespiti için öneriler
================
Sorularınız için sparta@sparta.com.tr
One of the major challenges when using security monitoring and analytics tools is how to deal with the high number of alerts and false positives. Even when the most straightforward policies are applied, SIEMs end up alerting on far too many incidents response that are neither malicious nor urgent.
Visit - https://siemplify.co
** CyberSecurity Certification Training: https://www.edureka.co/cybersecurity-certification-training **
This Edureka tutorial on "Cybersecurity Frameworks" will help you understand why and how the organizations are using the cybersecurity framework to Identify, Protect and Recover from cyber attacks.
Cybersecurity Training Playlist: https://bit.ly/2NqcTQV
Pardus Kurulumu
PARDUS, Debian GNU/Linux [1] temelli açık kaynak kodlu bir işletim sistemidir. İnternet üzerinden ücretsiz olarak indirilebilmekte ve kolay kurulabilmektedir. Kişisel veya kurumsal kullanımlar için Pardus’un rekabet edebilir ve sürdürülebilir bir işletim sistemi haline getirilmesi için TÜBİTAK ULAKBİM bünyesinde geliştirme ve idame çalışmaları devam ettirilmektedir.
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...Edureka!
**Cybersecurity Training: https://www.edureka.co/cybersecurity-certification-training **
This Edureka "Ethical Hacking Course" PPT will give you an expansive view into Ethical Hacking. This video will give you an exhaustive understanding on key topics of Ethical Hacking for beginners!
Follow us to never miss an update in the future.
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaEdureka!
YouTube Link: https://youtu.be/dz7Ntp7KQGA
** Edureka Ethical Hacking Course: https://www.edureka.co/cybersecurity-certification-training **
This Edureka PPT on "Ethical Hacking Full Course" will help you learn Ethical Hacking and Cyber Security concepts from scratch. You will learn about different kinds of Cyberattacks and ethical hacking tools used to prevent such attacks. There are a lot of demos on several tools in this Ethical Hacking Tutorial for Beginners PPT. You will also learn how to become an Ethical Hacker.
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Castbox: https://castbox.fm/networks/505?country=in
Conceito militar, agora aplicado a Cibersegurança, o "the cyber kill chain" foi desenvolvido pela Lockheed Martin em 2011. Ele descreve as fases que um adversário seguirá para alvejar uma Organização. São 7 fases bem definidas e este ataque é considerado bem sucedido
se / quando todas as fases foram realizadas.
(DOCUMENTO EM INGLÊS)
This amazing and unique event has taking place last saturday (29 Sept 2018) and has allowed cybersecurity enthusiasts from several regions of the Cameroon to meet and boost their capacity around a theme worthy of interest: APT type attacks.
During this workshop, the main focus was on exploring the MITRE approach with its ATT&CK framework for adversaries simulation, APT simulation.
Advanced Persistent Threats (APTs) are a serious concern as they represent a threat to an organization’s intellectual property, financial assets and reputation. In some cases, these threats target critical infrastructure and government institutions, thereby threatening the country’s national security itself.
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)WAJAHAT IQBAL
This post contains detailed Mindmap related to Complex subject of Cyber security and address critical components summarized as below:
- Cyber Security standards
- SOC (Security Operation Center)
- Cybersecurity Lifecycle
- Hacker Kill Chain
- Malware (Types,Protection Mechanism)
- Cyber Architecture
- CSC (Critical Security Standards)
- Incident Management
- Network Perimeter best security practices
- Final Case Study
I hope the Technical post is appreciated and liked by Security Consultants and Subject Matter experts on Cybersecurity.Your criticals Inputs are appreciated.Thank you
- Wajahat Iqbal
(Wajahat_Iqbal@Yahoo.com)
MITRE’s ATT&CK is a community-driven knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary’s life cycle and the platforms they are known to target. By scoping the wide breadth of the MITRE ATT&CK matrix to focus initially on the techniques used by threat actors you specifically care about, you can help the defenders create more useful and impactful detections first. Once you start emulating the appropriate threat actors, you can practice your defenses in a scenario that’s more realistic and applicable without the need for an actual intrusion. The speakers are providing a process and a case study of APT3 - a China-based threat group - for how to go from finding threat intelligence, sifting through it for actionable techniques, creating emulation plans, discovering how to emulate different techniques... to actually operating on a network. They are also providing a beginning "cheat sheet" for this actor to give a starting point for red and blue teams to accomplish these techniques in their own environment without the need to build their own tooling.
Exploring Risk and Mapping the Internet of Things with Autonomous DronesPraetorian
Recently featured in Fortune Magazine, Praetorian’s Internet of Things Map Project gave the public a glimpse into potential risk associated with thousands of exposed Internet of Things devices it revealed. Paul Jauregui, Vice President of Praetorian, will share his experience leading the Internet of Things Mapping Project. In this session you will learn how Praetorian security engineers developed and outfitted an autonomous drone with custom ZigBee-sniffing hardware used to discover, fingerprint, and map several thousand Internet of Things devices in Austin, TX. The talk will also explore best practices and recommendations designed to help product teams avoid common Internet of Things embedded device security issues. This unique and entertaining session will engage the audience’s curiosity about emerging Internet of Things issues and showcase innovative approaches to exploring the Internet of Things landscape.
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaEdureka!
YouTube Link: https://youtu.be/dz7Ntp7KQGA
** Edureka Ethical Hacking Course: https://www.edureka.co/cybersecurity-certification-training **
This Edureka PPT on "Ethical Hacking Full Course" will help you learn Ethical Hacking and Cyber Security concepts from scratch. You will learn about different kinds of Cyberattacks and ethical hacking tools used to prevent such attacks. There are a lot of demos on several tools in this Ethical Hacking Tutorial for Beginners PPT. You will also learn how to become an Ethical Hacker.
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Castbox: https://castbox.fm/networks/505?country=in
Conceito militar, agora aplicado a Cibersegurança, o "the cyber kill chain" foi desenvolvido pela Lockheed Martin em 2011. Ele descreve as fases que um adversário seguirá para alvejar uma Organização. São 7 fases bem definidas e este ataque é considerado bem sucedido
se / quando todas as fases foram realizadas.
(DOCUMENTO EM INGLÊS)
This amazing and unique event has taking place last saturday (29 Sept 2018) and has allowed cybersecurity enthusiasts from several regions of the Cameroon to meet and boost their capacity around a theme worthy of interest: APT type attacks.
During this workshop, the main focus was on exploring the MITRE approach with its ATT&CK framework for adversaries simulation, APT simulation.
Advanced Persistent Threats (APTs) are a serious concern as they represent a threat to an organization’s intellectual property, financial assets and reputation. In some cases, these threats target critical infrastructure and government institutions, thereby threatening the country’s national security itself.
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)WAJAHAT IQBAL
This post contains detailed Mindmap related to Complex subject of Cyber security and address critical components summarized as below:
- Cyber Security standards
- SOC (Security Operation Center)
- Cybersecurity Lifecycle
- Hacker Kill Chain
- Malware (Types,Protection Mechanism)
- Cyber Architecture
- CSC (Critical Security Standards)
- Incident Management
- Network Perimeter best security practices
- Final Case Study
I hope the Technical post is appreciated and liked by Security Consultants and Subject Matter experts on Cybersecurity.Your criticals Inputs are appreciated.Thank you
- Wajahat Iqbal
(Wajahat_Iqbal@Yahoo.com)
MITRE’s ATT&CK is a community-driven knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary’s life cycle and the platforms they are known to target. By scoping the wide breadth of the MITRE ATT&CK matrix to focus initially on the techniques used by threat actors you specifically care about, you can help the defenders create more useful and impactful detections first. Once you start emulating the appropriate threat actors, you can practice your defenses in a scenario that’s more realistic and applicable without the need for an actual intrusion. The speakers are providing a process and a case study of APT3 - a China-based threat group - for how to go from finding threat intelligence, sifting through it for actionable techniques, creating emulation plans, discovering how to emulate different techniques... to actually operating on a network. They are also providing a beginning "cheat sheet" for this actor to give a starting point for red and blue teams to accomplish these techniques in their own environment without the need to build their own tooling.
Exploring Risk and Mapping the Internet of Things with Autonomous DronesPraetorian
Recently featured in Fortune Magazine, Praetorian’s Internet of Things Map Project gave the public a glimpse into potential risk associated with thousands of exposed Internet of Things devices it revealed. Paul Jauregui, Vice President of Praetorian, will share his experience leading the Internet of Things Mapping Project. In this session you will learn how Praetorian security engineers developed and outfitted an autonomous drone with custom ZigBee-sniffing hardware used to discover, fingerprint, and map several thousand Internet of Things devices in Austin, TX. The talk will also explore best practices and recommendations designed to help product teams avoid common Internet of Things embedded device security issues. This unique and entertaining session will engage the audience’s curiosity about emerging Internet of Things issues and showcase innovative approaches to exploring the Internet of Things landscape.
The goal of the talk is to demonstrate how technical vulnerabilities in the IT components can be used to bypass industrial and functional safety features and create cable melting or blackout conditions. Few (fixed) vulnerabilities in Relay Protection terminals discovered by the SCADA StrangeLove team will be discussed.
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...CODE BLUE
Tons of insecure IoT devices are out there and ready to be compromised to join next IoT botnet or misused in even more serious threats. Since many of them are unmanaged, the situation does not seem to improve naturally in a short term. This talk will focus on series of efforts on discovery, monitoring, analysis, and notification of these devices trying to clean up "the mess".
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...CODE BLUE
Kimsuky is a North Korean APT possibly controlled by North Korea's Reconnaissance General Bureau. Based on reports from the Korea Internet & Security Agency (KISA) and other vendors, TeamT5 identified that Kimsuky's most active group, CloudDragon, built a workflow functioning as a "Credential Factory," collecting and exploiting these massive credentials.
The credential factory powers CloudDragon to start its espionage campaigns. CloudDragon's campaigns have aligned with DPRK's interests, targeting the organizations and key figures playing a role in the DPRK relationship. Our database suggested that CloudDragon has possibly infiltrated targets in South Korea, Japan, and the United States. Victims include think tanks, NGOs, media agencies, educational institutes, and many individuals.
CloudDragon's "Credential Factory" can be divided into three small cycles, "Daily Cycle," "Campaign Cycle," and "Post-exploit Cycle." The"Daily Cycle" can collect massive credentials and use the stolen credentials to accelerate its APT life cycle.
In the "Campaign Cycle," CloudDragon develops many new malware. While we responded to CloudDragon's incidents, we found that the actor still relied on BabyShark malware. CloudDragon once used BabyShark to deploy a new browser extension malware targeting victims' browsers. Moreover, CloudDragon is also developing a shellcode-based malware, Dust.
In the "Post-exploit Cycle," the actor relied on hacking tools rather than malicious backdoors. We also identified that the actor used remote desktop software to prevent detection.
In this presentation, we will go through some of the most significant operations conducted by CloudDragon, and more importantly, we will provide possible scenarios of future invasions for defense and detection.
In this presentation, we delve into the world of GTP (GPRS Tunneling Protocol) security, peeling back the layers to reveal potential risks and their far-reaching impact on the ever-evolving 5G landscape.
Key Highlights:
-️ Understanding GTP: Get to the core of GTP and its critical role in mobile networks.
- The 5G Nexus: Explore the complex relationship between 5G, 4G, and legacy networks.
- Uncovering Vulnerabilities: Examine the common thread of GTP vulnerabilities spanning generations.
- Securing the Future: Discover how knowledge of GTP vulnerabilities can empower mobile operators to fortify their networks and safeguard user data.
DDoS Attack on DNS using infected IoT DevicesSeungjoo Kim
[Case Study] DDoS Attack on DNS using infected IoT Devices @ ACSAC 2015 (The 31st Annual Computer Security Applications Conference 2015), which is one of the most important cyber security conferences in the world and the oldest information security conference held annually
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests📡 Sebastien Dudek
Presentation made at SecurityPWNing 2018 explaining how to intrude a company using radio attacks and real cases scenarios we encountered during our tests.
Slide yang kupresentasikan di MII-Intel Seminar (Jakarta, 30/10/2019)
IoT is the Future. Or even, IoT is widely adopted now.
Are you sure you are prepared enough for it? Are confident that your IoT solution is secure?
How Red Hat ran a global OpenVPN offer during the COVID-19 pandemic with 99% ...All Things Open
Presented by: Mauricio Teixeira, Red Hat
Presented at All Things Open 2020
Abstract: Red Hat has been running a global OpenVPN infrastructure for their associates for years, which have been put under the microscope during the COVID-19 pandemic, and has been put under a lot of stress. Everything ran smoothly, without outages, without snags, with an average of 60% of company associates connected simultaneously during peak times. During this talk, we will demonstrate how the infrastructure has been configured, and all of the Open Source (and proprietary) technologies that were involved.
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension Inc.
Duwayne Watson, a Cisco specialist from Ingram Micro, showcases various Data Security and Protection solutions such as: AMP, Umbrella, and CloudLock. These solutions can help your business remain compliant with PIPEDA legislation.
The Log4Shell Vulnerability – explained: how to stay secureKaspersky
On December 9th, a Chinese researcher posted his now-monumental discovery on Twitter: there was a Remote Code Execution vulnerability in the popular Apache Log4j library. This library is used in millions of commercial and open-source applications. Ranked 10 out of 10 in terms of severity, CVE-2021-44228, also known as Log4Shell, is capable of giving attackers full control over targeted systems.
The exploit takes advantage of Apache’s Java Naming and Directory Interface (JNDI), which provides programmers with an easy way to process remote commands and remote objects by calling external objects. However, with Log4Shell, attackers can inject their own code into the JNDI lookup command: code that will then be executed on the targeted system.
The Log4Shell Vulnerability – explained: how to stay secureKaspersky
On December 9th, researchers uncovered a zero-day critical vulnerability in the Apache Log4j library used by millions of Java applications. CVE-2021-44228 or “Log4Shell” is a RCE vulnerability that allows attackers to execute arbitrary code and potentially take full control over an infected system. The vulnerability has been ranked a 10/10 on the CVSSv3 severity scale.
While the Apache Foundation has already released a patch for this CVE, it can take weeks or months for vendors to update their software, and there are already widespread scans being conducted by malicious attackers to exploit Log4Shell.
What should companies or organizations do?
Join Marco Preuss, Head of Europe’s Global Research and Analysis (GReAT) team, Marc Rivero and Dan Demeter, Senior Security Researchers with GReAT, for an in-depth discussion on Log4Shell and a live Q&A session.
To see the full webinar, please visit: https://securelist.com/webinars/log4shell-vulnerability-how-to-stay-secure/?utm_source=Slideshare&utm_medium=partner&utm_campaign=gl_jespo_je0066&utm_content=link&utm_term=gl_Slideshare_organic_s966w1tou5a0snh
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...Kaspersky
Алексей Гуревич, Индивидуальный член CIGRE, член комитета B5 CIGRE, секретарь рабочей группы D2.51 комитета D2 CIGRE, член рабочей группы по кибербезопасности EnergyNet, в своем докладе рассказывает о кибербезопасности систем управления современных объектов электроэнергетики.
Подробнее о конференции: https://kas.pr/kicsconf2021
#KasperskyICS #KICScon
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктурыKaspersky
Максим Бородько, Генеральный директор GPSPATRON, в своем докладе рассказывает о применении ГНСС в критической инфраструктуре, типах спуфинговых атак и методах их детектирования; делает обзор зарегистрированных инцидентов в мире, России и Беларуси, а также прогнозирует применение ГНСС спуфинга в будущем.
Подробнее о конференции: https://kas.pr/kicsconf2021
#KasperskyICS #KICScon
Кирилл Набойщиков. Системный подход к защите КИИKaspersky
Кирилл Набойщиков, Лидер направления защиты КИИ «Лаборатории Касперского», в своем докладе рассказывает о важности системного подхода к защите КИИ.
Подробнее о конференции: https://kas.pr/kicsconf2021
#KasperskyICS #KICScon
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...Kaspersky
Вениамин Левцов, Директор глобального центра экспертизы по корпоративным решениям, рассказывет о стратегии трасформации решений Лаборатории Касперского для промышленных сред.
Подробнее о конференции: https://kas.pr/kicsconf2021
#KasperskyICS #KICScon
Джан Демирел (Турция). Текущий статус регулирования промышленной кибербезопас...Kaspersky
Джан Демирел, Глава команды сервисов по индустриальной кибербезопасности в Cyberwise, в своем докладе рассказывает о текущем статусе регулирования промышленной кибербезопасности в Турции в свете геополитики и стратегии.
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021Kaspersky
Мария Гарнаева, Старший исследователь угроз информационной безопасности в «Лаборатория Касперского», в своем докладе делает обзор целевых атак на промышленные компании в 2020 и 2021 годах.
Подробнее о конференции: https://kas.pr/kicsconf2021
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...Kaspersky
Активное расширение областей применения киберфизических систем, в том числе в области промышленной автоматизации, привело к необходимости переосмысления подходов к обеспечению информационной безопасности систем с фактически переменным набором составляющих их компонентов. Дмитрий Правиков, Директор Научно-образовательного центра новых информационно-аналитических технологий (НОЦ НИАТ) РГУ нефти и газа (НИУ) им. И. М. Губкина, в своем докладе рассматривает концепцию, реализованную до верхнеуровневого алгоритма, которая предусматривает формирования подходов к обеспечению безопасности на уровне переменного (по составу входящих в него элементов) роя киберфизических систем.
Подробнее о конференции: https://kas.pr/kicsconf2021
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...Kaspersky
Андрей Суворов, Генеральный директор НПО «Адаптивные Промышленные Технологии», и Максим Карпухин, Директор по продажам НПО «Адаптивные Промышленные Технологии», в своем докладе рассматривают под микроскопом KISG 100 на KasperskyOS - первое реальное киберимунное устройство для IIoT.
Подробнее о конференции: https://kas.pr/kicsconf2021
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...Kaspersky
Глеб Дьяконов, Директор по консалтингу в «NtechLab», в своем докладе рассказывает о ИИ-видеоаналитике как инструменте копроративного риск-менеджмента в промышленных компаниях.
Подробнее о конференции: https://kas.pr/kicsconf2021
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтраKaspersky
Основные уроки текущих и завершенных проектов по категорированию, проектированию и внедрению комплексных систем информационной безопасности (ИБ) значимых объектов КИИ.
Развертывание продуктов KICS for Networks, KICS for Nodes в составе перечня средств защиты. Возникавшие проблемы при внедрениях в технологических сетях предприятий, как они были преодолены на конкретных случаях, обобщенные выводы и рекомендации. Как построить эффективную ИБ конфигурацию в сложных технологических и организационно-штатных системах реального предприятия.
О чем говорят производственники, когда обсуждают с нашими специалистами вопросы ИБ и отказоустойчивость технологических процессов. Особенности различных секторов экономики РФ при проектировании ИБ решений. Как проекты цифровизации влияют и будут влиять на уровень защищенности технологических сетей. Интернет вещей и 5G сети на производстве. Что в перспективе 2-3 лет придется менять в концепциях защиты АСУ ТП. Все эти вопросы поднимает Игорь Рыжов, Заместитель директора Центра промышленной безопасности АО НИП «Информзащита».
Подробнее о конференции: https://kas.pr/kicsconf2021
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...Kaspersky
Александр Карпенко, Руководитель направления защиты АСУ ТП и КИИ «Инфосистемы Джет», в своем докладе описывает различия промышленных систем управления, возможности по обеспечению безопасности в них в зависимости от их возраста и технических особенностей, а также рассуждает о возможности тиражирования единой архитектуры системы защиты на все типы защищаемых объектов.
Подробнее о конференции: https://kas.pr/kicsconf2021
Марина Сорокина. Криптография для промышленных системKaspersky
Презентация Марины Сорокиной, Руководителя продуктового направления в ИнфоТеКС, посвящена теме использования криптографии для защиты промышленных систем. Вопрос необходимости применения криптографических методов для защиты АСУ достаточно часто обсуждается сообществом, однако рассуждения, как правило, касаются сценариев по обеспечению конфиденциальности при передачи информации по каналам связи. Криптография же - это не только шифрование, а сценарии безопасности от защиты каналов до обеспечения целостности самих устройств АСУ и доверия к ним. В докладе рассказывается, какие сценарии используются и как они реализуются в современных АСУ на примерах продуктов компании ИнфоТеКС – промышленного шлюза безопасности ViPNet Coordinator IG, криптоклиента ViPNet Client (в том числе для KOS), Встраиваемого решения для АСУ ViPNet SIES и криптобиблиотек ViPNet OSSL (в том числе для KOS).
Подробнее о конференции: https://kas.pr/kicsconf2021
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...Kaspersky
Александр Лифанов, Руководитель направления «Промышленные компьютеры и граничные вычисления» в Siemens, в своем докладе рассказывает о платформе граичных вычислений Siemens Industrial Edge.
Подробнее о конференции: https://kas.pr/kicsconf2021
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...Kaspersky
Александр Волошин, Директор Центра компетенций НТИ «Технологии транспортировки электроэнергии и распределенных интеллектуальных энергосистем» НИУ «МЭИ», в своем докладе рассказывает об исследованиях и разработках решений по обеспечению ИБ современных и перспективных комплексов АСУ ТП.
Подробнее о конференции: https://kas.pr/kicsconf2021
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...Kaspersky
Евгений Дружинин, Ведущий эксперт направления информационной безопасности в КРОК, в своем докладе освещает следующие аспекты реализации проекта по защите АСУ ТП:
1. Какие типичные проблемы мешают внедрению средств защиты АСУ ТП?
2. Как выглядит целевое состояние защищенной АСУ ТП: архитектура, ключевые характеристики.
3. Как достичь целевого состояния защищенности: этапы, варианты.
4. Особенности и «подводные камни» модернизации ИТ-инфраструктуры.
5. Способы подтверждения и особенности обеспечения совместимости средств защиты с компонентами АСУ ТП: вовлекаемые стороны, виды испытаний.
6. Особенности этапа построения систем безопасности АСУ ТП: лучшие практики при внедрении средств защиты.
7. Важные аспекты надежной эксплуатации систем безопасности АСУ ТП: особенности обновления средств защиты, внешняя техническая поддержка.
Подробнее о конференции: https://kas.pr/kicsconf2021
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций в соотве...Kaspersky
При создании АСУ ТП электрических подстанций заказчики пользуются годами наработанными схемами, шаблонами технических заданий, где учтено все, кроме требований современного законодательства. Вендоры АСУ ТП, в свою очередь, также часто не касаются вопросов информационной безопасности на первоначальных стадиях. Такая ситуация приводит к тому, что конкурс проводится между поставщиками, включающими в свое предложение системы информационной безопасности и поставщиками, игнорирующими данный вопрос на этапе конкурса. Тем не менее, требования всплывают на поздних этапах, когда служба ИБ эксплуатации не принимает объект. Кто виноват и что делать? В своем докладе на этот вопрос отвечает независимый эксперт Алексей Иванов.
Подробнее о конференции: https://kas.pr/kicsconf2021
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугрозKaspersky
Государства используют дипломатию как инструмент обеспечения собственной безопасности, в том числе в киберпространстве. Одна из центральных задач здесь — защита критической инфраструктуры от киберугроз. Олег Шакиров, Консультант ПИР-Центра, в своем докладе рассказывает, как дипломатия способствует этому путём выработки общих норм, касающихся ненападения на объекты КИ, создания механизмов сотрудничества между государствами в случае возникновения инцидентов, а также запуска программ помощи, направленных на укрепление кибербезопасности партнёров. Хотя потенциал кибердипломатии пока не раскрыт полностью, она уже позволяет решать конкретные задачи. Глобальный характер киберугроз будет делать её ещё более востребованной.
Подробнее о конференции: https://kas.pr/kicsconf2021
Василий Шауро. Развитие кибербезопасности АСУТП в условиях цифровизации пред...Kaspersky
Василий Шауро, Руководитель направления стратегического маркетинга в Emerson, в своем докладе рассказывает о развитии кибербезопасности АСУ ТП в условиях цифровизации предприятий.
Подробнее о конференции: https://kas.pr/kicsconf2021
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
1. 2022
Webinar:
Ukraine cyber attacks analysis
Kurt Baumgartner, Dan Demeter
Ivan Kwiatkowski, Marco Preuss, Costin Raiu
Global Research and Analysis Team, Kaspersky
3. 3 |
Historical overview of cyberattacks in Ukraine
● 2014 BlackEnergy APT - routers hack, elections
● Oct 2014 CyberBerkut leaks; Ukrainian Central Election
Commission DDoS attacks
● Dec 2015 Powergrid attack - BlackEnergy3, KillDisk
● Dec 2016 Industroyer attack - ICS functionality
● Jun 2017 NotPetya attack - supply chain
● Oct 2017 BadRabbit attack - FlowerDandy framework
● 2018 - Hades cyberespionage
● 2019-2022 - spike in Gamaredon / Armageddon ops
4. 4 |
APT name First active Currently active in UA
RedOctober 2007 No
Dukes .. APT29 2013 Unknown
Turla 2008 No
Sofacy / APT28 2008 Yes
CrouchingYeti / E.B. 2010 No
BlackEnergy APT (BE2,3) 2013-2014 No
Hades / Sandworm / Telebots 2015 Unknown
Gamaredon 2013 Yes, highly active
UNC1151 / Ghostwriter 2016 Yes
Historical overview of cyberattacks in Ukraine
5. 5 |
Overview of current
cyber activity
in Ukraine Known APT
activity
6. 6 |
Timeline of recent cyberattacks in Ukraine
21-23 Dec
2021
WhisperGate test variants
Custom wiper being developed
and tested.
28 Dec
2021
HermeticWiper
compiled
Sophisticated wiper
being developed and
final version compiled.
13 Jan
2022
WhisperGate deployed
Custom wiper deployed on a low
number of Ukraine
organizations.
14 Jan
2022
Ukraine websites hack
Multiple UA gov websites
hacked to display that
citizen data has been
compromised.
23 Feb
2022
HermeticWiper,
HermeticWizard,
Hermetic Ransom
Sophisticated
destructive malware
deployed on Ukraine
organizations.
24 Feb
2022
IsaacWiper
Another custom wiper deployed
in UA gov networks.
10. 10 |
Source IP Geolocation
Origin Hits
China 4090
United States 2147
Russian Federation 470
India 414
United Kingdom 373
Singapore 333
Germany 294
Korea, Republic of 260
Netherlands 248
Others 3097
21. 21 |
Pandora RAT / PandoraBlade
● Spearphishing campaigns
● Запит від СБУ (виконання до
25.02.2022).rar
● “План евакуації
(затверджений СБУ
28.02.2022 Наказом №
009363677833).rar”, which can
be roughly translated to
“Evacuation plan (approved by
the Security Service of Ukraine
on February 28, 2022 by Order
No. 009363677833)”
30. ● On Feb 24th, around 4am UTC, thousands of
Viasat satellite modems (eg. Surfbeam 2)
stopped working
● Modems are “bricked”, lights won’t turn on
● Collateral damage
● Result of “cyber event”. LEA investigating.
31. ● “Viasat is experiencing a partial network outage — impacting internet service for fixed
broadband customers in Ukraine and elsewhere on our European KA-SAT network,”
● Viasat provides KA-SAT service
● 5,800 of Enercon’s turbines, with 11GW of total capacity, have been affected
● Overall 30,000+ terminals in Europe were believed to have been affected
● Timing makes it unlikely to be a “random occurrence”
● Possible causes:
○ Malicious update
○ Remote hack / 0-day via SAT
○ Remote hack via internet
○ Collateral damage from other ops
The Viasat “cyber event”
35. 35 |
Hacktivists & other parties
Open UA support Open RU support Neutral
RaidForums Conti ransomware Lockbit ransomware
Anonymous collective CoomingProject ransomware ALPHV ransomware
IT ARMY of Ukraine Stormous ransomware
Belarusian Cyber-Partisans KILLNET
AgainstTheWest
NB65
Squad303
Kelvinsecurity + ...
36. 36 |
Summary and outlook
● We expect the number of cyber attacks in Ukraine will increase during the next 6 months
● Most of the current attacks are low complexity - to hinder attribution?
○ DDoS attacks, commodity rats
● More sophisticated attacks exist as well
○ Viasat “cyber event”
○ HermeticWiper
● The risk of the conflict spilling into the west is medium-high
● Most active APT groups - Gamaredon, UNC1151
● Companies need to take typical measures against:
○ DDoS attacks and network connectivity, ransomware and destructive malware (backups),
phishing (MFA), targeted attacks, supply chain attacks, firmware attacks
● Integrate Threat Intelligence into SOC, EDR
○ Leverage IOCs, Yara, Suricata and Sigma rules