Hunting for Nation State Attacks

Presented by

Chuck McWhiter, Sr. Sales Engineer at ReversingLabs; Chris Hoff, Product & Solutions Marketing Manager at ReversingLabs

About this talk

Nation state attackers like the Lazarus group from North Korea are highly skilled and well funded. They have the luxury of continually probing and attacking their targets until they are successful. Defenders, on the other hand, need the ability to not just deflect the attacks they see but hunt for the signs that their defenses have been breached. In an environment where the threat is specifically targeted at your organization, malware payloads will be highly customized which makes it hard to detect based on a standard list of IOC’s. This webinar will demonstrate how we used the Titanium Platform to correlate known IOC’s to discover hidden threats from the Hidden Cobra APT group. You will learn how to find similar malware samples targeting your organization that aren’t covered by released IOC lists. In this webinar, we’ll discuss and demonstrate: - How to analyze files in milliseconds vs hours - How to feed high quality intelligence into your defenses using our API’s - How to bring new visibility about file risks into your SOC process

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (17)
Subscribers (1375)
ReversingLabs is the leading provider of explainable threat intelligence solutions that shed the necessary light on complex file-based threats for enterprises stretched for time and expertise. Its hybrid-cloud Titanium Platform enables digital business resiliency, protects against new modern architecture exposures, and automates manual SOC processes with a transparency that arms junior analysts to confidently take action.