Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date [Episode - 3] Demystifying the MITRE ATT&CK Framework - Talk show Shehnaaz, Ram Vaidyanathan The episode 3 of this series talks about understanding attack advancement tactics used by adversaries, such as persistence and privilege escalation. 1 week ago | 22 mins [APAC] A Look at Cyberwarfare Actions and Detection Using HermeticWiper Malware Peter McNaull & Nick Cavalancia Months before Russia’s invasion of Ukraine, security analysts spotted several variants of “wiper” malware/ransomware targeting Ukrainian government ag... 2 weeks ago | 92 mins May TRU Intelligence Briefing Ryan Westman, Paul Aitken, Keegan Keplinger, Derek Thomas, Spence Hutchinson Join eSentire’s Threat Response Unit (TRU) as they share new research-driven observations of malware, notable vulnerabilities, threat actor groups, an... 2 weeks ago | 45 mins Hidden Active Directory Misconfigurations: Red Team Style Andrew Holden Oliveau, Consultant, Mandiant Active Directory is the most common on-premises identity provider solution for organizations around the globe. With the rise of cloud adoption, it is ... 4 weeks ago | 37 mins The New P&L TO THE POINT on Persistence beats Resistance Paul Spiers Welcome to this week's The New P&L TO THE POINT. The New P&L TO THE POINT is a weekly podcast series where, in around 10 minutes each week, we break d... 9 months ago | 11 mins A Look at Cyberwarfare Actions and Detection Using HermeticWiper Malware Peter McNaull & Nick Cavalancia Months before Russia’s invasion of Ukraine, security analysts spotted several variants of “wiper” malware/ransomware targeting Ukrainian government ag... 2 months ago | 92 mins Dns Admins Revisited -Achieving Privileged Persistence on a DC Yuval Gordon | Security Researcher at Semperis In a post on Medium in 2017, security researchers showed how users from the DNSAdmins group could use a feature abuse in the Microsoft DNS management ... 10 months ago | 30 mins MinIO Object Storage using the vSAN Data Persistence Platform Ugur Tigli - CTO, MinIO MinIO Object Storage on VMware Cloud Foundation with Tanzu using the vSAN Data Peristence platform 1 year ago | 65 mins Planning a Threat Hunting Program Aviel Golrochi, Threat Hunter Team Leader, CyberProof & Howard Silverman, Head of Marketing, CyberProof Threat Hunting has become an essential discipline for security operations teams, due to the persistence of attackers in evading perimeter controls and... 5 months ago | 39 mins Application Persistence: How to Secure Your Security Isha Khaira, Customer Success Manager & Neeraj Annachhatre, Product Marketing Manager You’ve made a solid investment in IT security. After all, you're not about to let your organization fall prey to cyber threats. Here's the bad news: ... 1 year ago | 34 mins Load more