
The Art of Threat Detection Engineering
DISCARDED: Tales From the Threat Research Trenches
00:00
Is There a Pyramid of Pain?
One of the things that they do alot, both from crime war as well as a p t, is incorporate different components to evade detection. So i'm curious, you know, there is a lot of different examples of this, but one we see a lot is gofencing. How do we write detections for that? Can you give us an example of a thread actor intent on thinking, your favorite thread actor using this and how ye respond to it? Yes. M molrats. Or for two las to fencing and also complex attack chains. And m for example, we saw earlier this year, which we also blocked about, that they were sending emals fit pediof attachments
Transcript
Play full episode