Rapid Response Case Study: MOVEit as fast as you can.

Logo
Presented by

Shanyn Ronis, Dan Wire, Jeff Seely, and Jeremy Kennelly

About this talk

We can’t predict when the next major zero-day vulnerability will hit, but we can do our best to be prepared for when it does. On May 31, 2023 the MOVEit Transfer vulnerability was announced and assigned CVE-2023-34362. Mandiant saw evidence of exploitation as early as May 27, 2023. UNC4857, recently merged with FIN11, has been very active in exploiting this vulnerability. Not all CVEs and exploits send security teams into rapid response mode, but all security teams need to know when to move it into gear. Join us as we share updates on recent threat actor exploitation, and best practices in building a rapid response function in your organization. - Learn why UNC4857 was merged with FIN11 and how they exploited the MOVEit vulnerability. - Discover the 3 steps to ensuring successful rapid response. - Gain insights into how organizations responded to MOVEit. - See how Mandiant quickly updated products to keep customers protected.
Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (370)
Subscribers (122445)
Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. By scaling decades of frontline experience, Mandiant helps organizations to be confident in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.