TARGETING MICROSOFT: RANSOMWARE TECHNIQUES AND HOW TO SPOT THEM

Logo
Presented by

Jamie Moles, Senior Technical Marketing Manager, ExtraHop | Adrian Sanabria, Senior Research Engineer, Cyber Risk Alliance

About this talk

Microsoft Active Directory (AD) is a target-rich environment for malicious actors. Attackers hone in on it because it's widely used and remains backward compatible with many versions of Microsoft Windows and Server environments. This webcast explores the specific techniques they use (DoublePulsar, for example) and how to defend against it via a layered detection approach that evaluates traffic using rules, statistical analysis, and AI to detect malicious activity.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (190)
Subscribers (11574)
The prevention and protection model of cybersecurity isn’t working: between the cloud, IoT, and the sheer pace of change, the enterprise is no longer built to be walled in. This channel provides educational webinars to help SecOps (SOC) and NetOps (NOC) teams, from CIOs and CISOs to analysts and practitioners, change their perspective in order to identify, investigate, and respond to threats across the modern attack surface. We explore how cloud-native network detection and response (NDR) provides the complete visibility, real-time threat detection, and intelligent response you need to secure your hybrid environment. You’ll also find product information about ExtraHop Reveal(x) which enables you to: Eliminate blind spots: Cover 100% of your hybrid environment, Detect what matters: Find threats 95% faster, and Act quickly: Respond to breaches 70% faster. Learn more at www.extrahop.com