How Attackers Harvest Credentials & Gain Initial Access

Logo
Presented by

Members of our Insikt Group (Lindsay Kaye, Justin Grosfelt, John Terbush), Recorded Future

About this talk

In part one of the Attack Life Cycle Webinar Series: How Attackers Harvest Credentials & Gain Initial Access, members of our Insikt Group (Lindsay Kaye, Justin Grosfelt, John Terbush) exposed the phases of the cyber attack lifecycle through the eyes of the attacker. Attendees can expect to leave this webinar with: - An understanding of the cyber attack lifecycle - Real-world examples of how attackers get credentials and gain initial access - A detailed look into Insikt Group exclusive research and reports on credential harvesting and detections for attacker’s favorite web shells
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (72)
Subscribers (4045)
Recorded Future delivers meaningful results for our clients. Whether it’s improving efficiency for research and triage, slashing time to threat detection, or improving your organization’s bottom line, we are dedicated to saving our clients time and money — in addition to measurably reducing risk. We believe that intelligence is the key to unlocking the potential of security programs – and protecting our organizations and communities. We believe that security solutions should do just that: be solutions – helping to solve big problems and reduce risk. We know that the right intelligence, in the hands of the right people, at the right time, stops attackers in their tracks.