Inside the Threat: Secureworks CTU Analysis | Episode 3: Understanding AitM Tactics and Credential Theft

Logo
Presented by

Rafe Pilling, Director of Threat Intelligence, CTU Threat Research, Secureworks

About this talk

Join Secureworks® CTU™ experts for an in-depth exploration of "Understanding Adversary in the Middle (AitM) Tactics and Credential Theft," a crucial topic for anyone concerned with protecting remote access solutions or SaaS applications. This webinar will unravel the complexities of AitM attacks, a sophisticated method used by threat actors to intercept and steal user credentials or tokens. We will delve into the mechanics of these attacks, highlight real-world examples, and examine the tools and technologies employed by attackers. Additionally, we'll discuss effective strategies for detection, prevention, and response, providing practical advice to safeguard your organization. Don't miss this opportunity to enhance your understanding and fortify your defenses against one of the most insidious threats in the digital landscape. In this informational webinar, you will: · Gain insights into what AitM attacks are and why you need to watch out for these type of attacks · Discover the various types of AitM attacks and how they work · Learn how to protect your organization from AitM attacks
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (102)
Subscribers (19310)
We help protect organisations from today’s most pervasive cybersecurity threats. With us on your team, you’ll rest easy knowing your mission-critical assets are safe from threat actors.