Threat Hunting For The Phish With Threatconnect, King & Union, And Hyas

Threat Hunting For The Phish With Threatconnect, King & Union, And Hyas

Watch practitioners from ThreatConnect, King & Union, and HYAS demonstrate an investigation and share best practices as they weave together their tools to locate adversary infrastructure.  Starting from a single phishing email, the team explains the process of identifying other indicators of compromise (IOCs) along with adjacent adversary infrastructure that can be blocked.