Hunting for Nation State Attacks

Logo
Presented by

Chuck McWhiter, Sr. Sales Engineer at ReversingLabs; Chris Hoff, Product & Solutions Marketing Manager at ReversingLabs

About this talk

Nation state attackers like the Lazarus group from North Korea are highly skilled and well funded. They have the luxury of continually probing and attacking their targets until they are successful. Defenders, on the other hand, need the ability to not just deflect the attacks they see but hunt for the signs that their defenses have been breached. In an environment where the threat is specifically targeted at your organization, malware payloads will be highly customized which makes it hard to detect based on a standard list of IOC’s. This webinar will demonstrate how we used the Titanium Platform to correlate known IOC’s to discover hidden threats from the Hidden Cobra APT group. You will learn how to find similar malware samples targeting your organization that aren’t covered by released IOC lists. In this webinar, we’ll discuss and demonstrate: - How to analyze files in milliseconds vs hours - How to feed high quality intelligence into your defenses using our API’s - How to bring new visibility about file risks into your SOC process
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (82)
Subscribers (2302)
ReversingLabs empowers modern software development & SOC teams to protect their software releases & organizations from sophisticated threats.