The Cybersecurity Defenders Podcast cover image

#131 - Network threat hunting with Chris Brenton, COO at Active Countermeasures

The Cybersecurity Defenders Podcast

00:00

Indicators of Compromise and Threat Hunting Techniques

The chapter covers indicators of compromise (IOCs) like the behavior of Sunburst calling out every 15 minutes, associated with tools like Cobalt Strike, and discusses how analysis of callout frequency can reveal patterns. It delves into threat actors mimicking human behavior, the role of automation in network threat hunting, and the limitations of using signatures and threat intelligence in identifying novel intrusions. The discussion also explores different types of threat actors, recent compromise attempts, and future trends in network threat hunting.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app