Latest 2023 Threat Hunting Report Reveals a 583% Increase in Kerberoasting Attacks
CrowdStrike’s 2023 Threat Hunting report reveals a 583% increase in Kerberoasting attacks, emphasizing a significant shift towards identity-based intrusions. Additionally, the report highlights a threefold rise in adversaries using the Linux tool linPEAS for cloud environment exploitation, a 312% spike in adversaries using legitimate remote monitoring and management (RMM) tools, and a 147% uptick in access broker advertisements in underground networks.
CrowdStrike Threat Hunting Report findings and recommendations from SANS instructors:
The number of novel attack techniques continue to rise and pose a significant threat to organizations. With the latest FOR508 course update, new exercises showcase a cross-section of attacker techniques to further reinforce the forensic skills necessary to identify, investigate, and remediate wide-scale computer intrusions. The update includes a major upgrade to the courseware and replacement of every hands-on exercise. Learn more about the latest course update here.
Put your skills learnt from affiliate training to the test, with this certification focusing on the core skills required to collect and analyze computer system data. Candidates have the knowledge, skills, and ability to conduct formal incident investigations and handle advanced incident handling scenarios, including internal and external data breach intrusions, advanced persistent threats, anti-forensic techniques used by attackers, and complex digital forensic cases. Explore the Certification>
Save 20% on GIAC's Newest Applied Knowledge Certification (GX-FA): The GIAC Experienced Forensic Analyst (GX-FA) Certification further demonstrates that a candidate is qualified for hands-on digital forensic and threat hunting roles. For a limited time only, save 20% on GX-FA with code GXFA20.?
*Discount will to be applied to the Applied Knowledge certification price found here. Offer ends October 2, 2023.??
This year, the SANS Threat Hunting survey focused on the hunters themselves and how their organizations support threat hunting. This white paper examines the skills beginner and experienced threat hunters must hone. Download now>
领英推荐
Knowing what’s normal on a Windows host helps cut through the noise to quickly locate potential malware. Use this poster as a reference to know what’s normal in Windows and to focus your attention on the outliers. Download now>
FOR577: LINUX Incident Response & Threat Hunting course ?is now open in Beta. The course teaches the skills needed to identify, analyze, and respond to attacks on Linux platforms and how to use threat hunting techniques to find even the stealthiest attacker. Learn More or Register here >
SANS CTI Summit & Training Summit : Jan 29-30 | Courses: Jan 31-Feb 5 Washington, DC & Free Live Online | CPEs: 12 | Call for papers ends September 18!
Join us in Washington, DC or Free Live Online and walk away from Cyber Threat Intelligence Summit with new perspectives and learn from case studies that challenge CTI assumptions and result in a shift in your understanding.
Digital Forensics analysis of Apple devices other than iPhones and iPads: current possibilities and limits. Techniques to acquire Apple Watch, Apple TV and Apple HomePod will be discussed, as well as the analysis of extracted data with practical labs. This is a 3-hour hands on workshop. Register now>
Next Livestream: Sept 21st | 1:00 pm ET | Subscribe here
Join SANS Certified Instructor Katie Nickels as she gives the rundown on the latest threats you should know about. Each month, Katie will be joined by various guests to provide different perspectives from across the community on important developments in recent threat news.