Featured
Decoding PowerDrop Vulnerability: AI and ML in Adlumin's Threat Hunting
Kevin O’Connor, Director of Threat Research at Adlumin
In the ever-evolving landscape of cybersecurity threats, organizations face the constant challenge of detecting and mitigating sophisticated attacks in a timely manner. Implementing automation and machine learning into a threat hunting strategy is key, but what does that look like in practice?
Join Kevin O'Connor, Adlumin’s Director of Threat Research, as he demonstrates how his team discovered and remediated PowerDrop, an insidious PowerShell script for command and control attacks targeting the U.S. aerospace defense industry.
During Kevin’s live demo, you will learn:
- How Adlumin's Threat Research Team used Artificial Intelligence (AI) and Machine Learning (ML) to detect and remediate PowerDrop
- Daily threat hunting methodologies employed by O'Connor and his team
- Exploring the advantages of AI and ML in the field of threat hunting
As a thank you for joining our webinar, we’ll send you our new overview guide, The Executive’s Overview to Proactive Cybersecurity: Harnessing the Power of Security Operations. Additionally – one lucky participant will receive a $200 Amazon gift card.
All episodes
-
Threat Hunting that Protects Your Business from Cyber Risks
Mark Sangster, Vice President, Chief of Strategy, Adlumin and Kevin O’Connor, Director of Threat Research, Adlumin
Malware poses a significant threat to businesses across all industries. Cybercriminals operate like Fortune 500 companies, optimizing their operations with superior technology and expertise, and increasing revenue in terms of ransoms and other illicit gains from their attacks. As criminals uplevel their ability to infiltrate and exploit your business, proactive threat hunting is non-negotiable when it comes to stopping malware-based attacks before they become business disrupting or cripple operations.
Join Adlumin's Director of Threat Research, Kevin O'Connor, as he unpacks real-life examples of how Adlumin’s Threat Intel Team leverages observables and Indicators of Compromise (IoCs) to stop attacks in their tracks.
-
Beauty Is in the Eye of the Deceiver
Mark Sangster, Vice President, Chief of Strategy, Adlumin and Kevin O’Connor, Director of Threat Research, Adlumin
Deception Technology for Your Zero-Trust Arsenal
Traditional security measures are no longer enough to keep up with the increase in sophisticated cyber threats. Join Adlumin's experts as they discuss zero trust and complementing detection and response capabilities with deception technology. Deception provides not only early-warning detection but insight into criminal tactics and techniques. This threat intelligence is critical to protecting your business.
Join Mark Sangster, Adlumin's Vice President, Chief of Strategy, and Kevin O'Connor to learn:
- An understanding of how zero trust applies to cyber risk management
- How to use deception technologies to detect threats quickly and gain threat intelligence into criminal tactics and techniques
- Ways to complement detection and response capabilities with deception technologies to strengthen your security posture -
Decoding PowerDrop Vulnerability: AI and ML in Adlumin's Threat Hunting
Kevin O’Connor, Director of Threat Research at Adlumin
In the ever-evolving landscape of cybersecurity threats, organizations face the constant challenge of detecting and mitigating sophisticated attacks in a timely manner. Implementing automation and machine learning into a threat hunting strategy is key, but what does that look like in practice?
Join Kevin O'Connor, Adlumin’s Director of Threat Research, as he demonstrates how his team discovered and remediated PowerDrop, an insidious PowerShell script for command and control attacks targeting the U.S. aerospace defense industry.
During Kevin’s live demo, you will learn:
- How Adlumin's Threat Research Team used Artificial Intelligence (AI) and Machine Learning (ML) to detect and remediate PowerDrop
- Daily threat hunting methodologies employed by O'Connor and his team
- Exploring the advantages of AI and ML in the field of threat huntingAs a thank you for joining our webinar, we’ll send you our new overview guide, The Executive’s Overview to Proactive Cybersecurity: Harnessing the Power of Security Operations. Additionally – one lucky participant will receive a $200 Amazon gift card.