Splunk Threat Research: Cloud Federated Credential Abuse & Cobalt Strike

Logo
Presented by

Kelly Huang, Security Product Marketing, Rod Soto, Principal Security Research Engineer, Michael Haag, Snr Threat Researcher

About this talk

The Splunk Threat Research team is dedicated to understanding malicious actor behaviour and researching known threats to build detections and analytics that the entire Splunk community can benefit from. The latest analytics from the team cover Cloud Federated Credential Abuse of Active Directory Federation Services and between Cloud Providers. They also published an Analytics Story to enable detection of Malleable C2 profiles deployed via Cobalt Strike, an emulation software that Red Teams and pen testers use that recently got into the hands of adversaries. Join this webinar to learn: - Why Cloud Federated Credential Abuse has to be top of mind of every security team - What Cobalt Strike is and what it takes to detect injected shellcode with Splunk - How the Splunk Threat Research team works and how you can benefit from what they do
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (291)
Subscribers (38825)
Splunk helps make organizations more resilient. Leading organizations use our unified security and observability platform to keep their digital systems secure and reliable. Organizations trust Splunk to prevent security, infrastructure, and application issues from becoming major incidents, absorb shocks from digital disruptions and accelerate digital transformation.