Featured

[APAC] Stories from the SOC: After Party
Ellis Fincham, Rapid7 | Lonnie Best, Rapid7 | Devin Krugly, Rapid7
With the cost of a data breach at an all-time high, Security Operation Center (SOC) teams need incident response measures to prevent threat actors from establishing persistent footholds within their environments.
This 30-minute session offers more than just theory; it shares recent exploit stories, trend analysis, and actionable threat-hunting techniques. Discover how research is pivotal in providing security teams with contextual understanding, enabling them to stay ahead of the curve and effectively respond to evolving cyber threats.
Gain invaluable insights into the challenges SOC analysts face and equip yourself with practical advice to navigate the evolving threat landscape. Learn real-world tactics and strategies to effectively empower security teams with the knowledge and tools to combat it.
All episodes
-
[APAC] Stories from the SOC: Malvertising Campaign Leads to Execution of Oyster Backdoor
Ellis Fincham - EMEA Threat & XDR Sales Specialist Lead, Thomas Elkins - Senior Malware Analyst
Join us for an insightful ‘Stories from the SOC’ webcast as we explore a recent mail advertising campaign targeting users with malicious installers disguised as popular software such as Google Chrome and Microsoft Teams. These installers deploy Oyster backdoor, also known as Broomstick, enabling cyber attackers to conduct hands-on-keyboard activity and deploy additional payloads.
During the webcast, we will examine:
The delivery methods of the Oyster backdoor
Provide an in-depth analysis of its components
Offer a Python script to help extract its obfuscated configurationRegister today to uncover the full story, and unlock new opportunities to strengthen your SOC.
-
[APAC] Stories from the SOC: After Party
Ellis Fincham, Rapid7 | Lonnie Best, Rapid7 | Devin Krugly, Rapid7
With the cost of a data breach at an all-time high, Security Operation Center (SOC) teams need incident response measures to prevent threat actors from establishing persistent footholds within their environments.
This 30-minute session offers more than just theory; it shares recent exploit stories, trend analysis, and actionable threat-hunting techniques. Discover how research is pivotal in providing security teams with contextual understanding, enabling them to stay ahead of the curve and effectively respond to evolving cyber threats.
Gain invaluable insights into the challenges SOC analysts face and equip yourself with practical advice to navigate the evolving threat landscape. Learn real-world tactics and strategies to effectively empower security teams with the knowledge and tools to combat it.
-
[APAC] Stories from the SOC: Closing Coverage Gaps with MXDR Expertise
Jon Schipp - Senior Director, Product Management at Rapid7, Hernan Diaz, Incident Responder at Rapid7
In today’s rapidly evolving threat landscape, defending your organization requires more than tools–it demands expertise, agility, and comprehensive visibility. Join us for our upcoming webinar to discover how Managed XDR (MXDR) provides a 24x7 solution including the talent, tools, and infrastructure to help you preempt, adapt, and respond to a changing threat landscape.
In this webinar, our experts will talk about:
- Closing Coverage Gaps: how to achieve end-to-end visibility across endpoints, networks, cloud, and identity
- Reducing Attack Surfaces and the importance of proactively remediating vulnerabilities at SOC speed
Leveraging Expertise for tailored security guidance
- Enhancing Response Capabilities by integrating advanced telemetry and threat intelligence
Employing multi-layered defense strategies to improve your security posture and prevent recurrenceLearn how MXDR delivers the expertise and technology needed to defend against today’s most sophisticated attacks
-
[APAC] Stories from the SOC: Failures and Fixes
John Fenninger - Sr. Manager, D&R, Hernan Diaz - D&R Analyst, Bret Steiman - Enterprise II from Rapid7
Rapid7's Managed Detection and Response (MDR) and Incident Response (IR) teams respond to multiple instances of organizational compromise where threat actors employ unique tools, techniques, and procedures (TTPs), including legitimate remote access tools, such as ScreenConnect, to maintain persistent access to compromised environments.
Join us for this webcast to hear directly from our SOC management and analyst teams about recent exploits and incidents they have assisted our customers with, and how Rapid7's MDR service uses visibility and insights to track down and eradicate threat actors from another organizational environment.