Watch this two-part webinar series with threat intelligence analysts from Recorded Future’s research arm, the Insikt Group, as they expose the phases of the cyber attack lifecycle through the eyes of the attacker.
By diving into real-world research and examples, you will get an up close look at how attackers are harvesting credentials through various means, how they gain initial access to public-facing web servers by using popular web shells, and how they maintain undetected access in the networks they target.
You will leave this on-demand webinar with:
Upcoming Webinars: Recorded Future webinars feature insights from well-known experts from inside the world of security intelligence.
Copyright © 2024 Recorded Future, Inc. | Privacy Policy