The End Game: Exploiting Attacker Weak Spots with TTP-based Detection

...

Download Indicators of compromise (IOCs) are a losing battle for security teams as they are easily changed by the attackers. Adopting a detection strategy based on Tactics, Techniques, and Procedures (TTPs) returns power to the defender.

What you will learn:

- Why IOC-based detection is no longer effective and the benefits of a TTP-based
- How Attackers easily change IOC artifacts but lack the time and effort to modify their core tools and techniques
- How a large commercial bank switched to a TTP-based approach and immediately stopped a major APT

Categories
APPLICATIONS
0 Comment

Leave a Reply

Captcha image


RELATED BY

  • 5300c769af79e

    10 Productivity Tools To Help You Win At Work

    But for everyone else, your screen color temperature matters because nighttime exposure to the blue-tinted light of a computer display can affect your sleep.If you can somehow manage to avoid staring in your computer screen in the evening, this may not be an issue.
  • 5300c769af79e

    Instagram Stories to Feature Video Ads

    Further, Instagram Business Tools will include insights on stories, which will allow business users to view the reach, impressions, replies and exits for each individual story.One in five stories generates a direct message from viewers, and 70 percent of Instagram users currently follow a business, according to the company.
  • 5300c769af79e

    Galaxy Note 7 Usage Declining, Slowly

    Nobody should be using a Samsung Galaxy Note 7, outside China.(If you have a Galaxy Note 7, see our story on how to return or exchange your unit.
  • 5300c769af79e

    FCC Aims To Accelerate 5G Rollout

    Tomorrow's 5G networks will be transformational, too, but in an entirely different way.There are two major components to making 5G a reality: spectrum and technology.