Threat Hunting For The Phish With Threatconnect, King & Union, And Hyas

Threat Hunting For The Phish With Threatconnect, King & Union, And Hyas

Watch practitioners from ThreatConnect, King & Union, and HYAS demonstrate an investigation and share best practices as they weave together their tools to locate adversary infrastructure.  Starting from a single phishing email, the team explains the process of identifying other indicators of compromise (IOCs) along with adjacent adversary infrastructure that can be blocked.

Close

Sign Up for Armory Newsletter

The latest industry insights direct to your inbox