
#131 - Network threat hunting with Chris Brenton, COO at Active Countermeasures
The Cybersecurity Defenders Podcast
00:00
Indicators of Compromise and Threat Hunting Techniques
The chapter covers indicators of compromise (IOCs) like the behavior of Sunburst calling out every 15 minutes, associated with tools like Cobalt Strike, and discusses how analysis of callout frequency can reveal patterns. It delves into threat actors mimicking human behavior, the role of automation in network threat hunting, and the limitations of using signatures and threat intelligence in identifying novel intrusions. The discussion also explores different types of threat actors, recent compromise attempts, and future trends in network threat hunting.
Transcript
Play full episode