Beacon analysis is an integral part of threat hunting. If you are not looking for beacons you take the chance of missing compromised IoT devices or anything that does not have a threat mitigation agent installed. I'll talk about what makes beacon hunting so hard, and how the open source tool RITA can simplify the process. Powerpoint Slides in Full Show Notes Full Show Notes: https://wiki.securityweekly.com/Episode574 Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
Beacon Analysis, Chris Brenton – Paul’s Security Weekly #574
Beacon analysis is an integral part of threat hunting. If you are not looking for beacons you take the chance of missing compromised IoT devices or anything that does not have a threat mitigation agent installed. I’ll talk about what makes beacon hunting so hard, and how the open source tool RITA can simplify the process. Powerpoint Slides in Full Show Notes Full Show Notes: https://wiki.securityweekly.com/Episode574 Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
Full Segment Notes
Stay in the Know, No Smoke and Mirrors – Join Our Newsletter
Get expert insights and technical breakdowns straight to your inbox.
You can skip this ad in 5 seconds







