4 current phishing techniques: Real-life examples and tips for detection

Logo
Presented by

Randy Franklin Smith of Ultimate Windows Security | Eric Brown and Brian Coulson of LogRhythm

About this talk

Many successful attacks begin with a phishing email that a user falls for. That’s why MITRE prominently features Spearphishing (T1192) as an Initial Access technique in ATT&CK. In this webinar, LogRhythm and Ultimate Windows Security explore the latest phishing techniques used by attackers and how MITRE ATT&CK can help detect and remediate these threats. In this webinar, we’ll show you actual examples of phishing attempts executed through: - Legitimate file-sharing sites - Fake Office 365 websites - Spoofed executive emails - The baseStriker vulnerability Register now to learn more.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (87)
Subscribers (19050)
We know your job isn’t easy. That’s why we combine log management, machine learning, SOAR, UEBA, and NDR to give you broad visibility across your environment so you can quickly uncover threats and minimise risk. But a mature SOC doesn’t just stop threats. With LogRhythm, you’ll easily baseline your security operations program and track your gains — so you can easily report your successes to your board. Hear best practices, see technology demos, listen to speaker panels on our European BrightTALK channel. Visit our website for more information: http://www.logrhythm.com/