Keynote: Cobalt Strike Threat Hunting | Chad Tilbury

Cracked versions of Cobalt Strike have rapidly become the attack tool of choice among enlightened global threat actors, making an appearance in almost every recent major hack, including SolarWinds, the ...
Active
Cracked versions of Cobalt Strike have rapidly become the attack tool...
Active
Whether you're new to the field of digital forensics, are working in an...
Active
The United States military makes extensive use of process and...
Active
I often hear that Playbooks can't be shared because they are org...
Active
Reviewing DFIR data is often like searching the internet in the 90s....
Active
Incident response is becoming difficult to manage in the era of...
Active
The professionalization of the criminal underground has led to attack...
Active
Terabytes of Exchange logs got you down? Need to look for 100 IP...
Active
In 2019, the FBI estimated that the global loss of Business Email...
Active
Learn what EvtxECmd and SQLECmd Maps are, what RECmd Batch Files are,...
Active
Incident responders require a toolset and resources that allow them to...
Active
When dealing with modern smartphone devices, both Android and iOS, we...