Nation state attackers like the Lazarus group from North Korea are highly skilled and well funded. They have the luxury of continually probing and attacking their targets until they are successful. Defenders, on the other hand, need the ability to not just deflect the attacks they see but hunt for the signs that their defenses have been breached. In an environment where the threat is specifically targeted at your organization, malware payloads will be highly customized which makes it hard to detect based on a standard list of IOC’s.
This webinar will demonstrate how we used the Titanium Platform to correlate known IOC’s to discover hidden threats form the Hidden Cobra APT group. You will learn how to find similar malware samples targeting your organization that aren’t covered by released IOC lists.
In this webinar, we’ll discuss and demonstrate:
- How to analyze files in milliseconds vs hours
- How to feed high quality intelligence into your defenses using our API’s
- How to bring new visibility about file risks into your SOC process