InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Finding Beacons In The Dark - A Guide To Stopping Cobalt Strike Attacks

Presented by

Jonathan Jackson - Director Sales Engineering APJ

About this talk

Cobalt Strike (CS) is the most widely used advanced adversary simulation and threat emulation software. It's very powerful, for both good and bad actors. CS delivers a post-exploitation framework that was developed to emulate the greatest features of late-stage malware ecosystems and allow its users to simulate adversary actions. The adoption of Cobalt Strike by global threat actors, and the framework’s use in hundreds of genuine intrusions, ransoms, and data breaches, shows that Beacon has fought its way to the top. It currently sits on the throne as the reigning champ of all malware toolkits. If it works, it wins. In this session, you will learn: • How security and threat intelligence community can proactively prevent their organisations from falling victim to the growing threat of Cobalt Strike Beacons and Team Servers. • How to turn the tables on APT groups and malicious threat actors - become the hunter instead of the hunted.
BlackBerry Cybersecurity

BlackBerry Cybersecurity

3812 subscribers31 talks
Intelligent Security. Everywhere.
BlackBerry is a leader in the areas of endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.
Related topics