SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
War	on	Stealth	Cybera/acks	that	
Target	Unknown	Vulnerabili:es	
	
Inves:gate,	Threat	Scope	Analysis	&	Forensics	of		
Advanced	Cyber	Threats	with	Apache	Metron	
George	VeFcaden		&	James	Sirota	
Apache	Metron	Commi0ers
2	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
Use	Case:			Phishing	A/ack
3	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
Phishing	A/acks	
Ã  What	is	a	Phishing	A0ack?	
–  An	a0ack	that	“baits”	unsuspecJng	workers	into	clicking	on	links	in	emails	and	
unknowingly	giving	a0ackers	a	toehold	in	their	employers’	systems.	
Ã  From	NYTIMES	ArJcle	(6/13/2016)		
“Phishing	a*acks	have	become	an	epidemic.	To	date,	more	than	90	percent	of	
breaches	have	begun	with	a	phishing	a*ack,	according	to	Verizon.	
Intelligence	experts	say	that	phishing	a*acks	are	the	preferred	method	of	
Chinese	hackers	who	have	managed	to	steal	things	as	varied	as	nuclear	
propulsion	technology	and	Silicon	Valley’s	most	guarded	soGware	code.”
4	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
DocuSign	Phishing	A/acks	
What	is	DocuSign?	
•  Provides	electronic	signature	technology	
and	Digital	TransacJon	Management	
services	for	facilitaJng	electronic	exchanges	
of	contracts	and	signed	documents.	
•  E.g:	If	you	get	a	new	job,	the	offer	le0er	will	
most	likely	be	presented	to	you	as	a	
“DocuSign	Doc”	which	requires	electronic	
signature.	
What	is	a	DocuSign	Phishing	A0ack?	
•  AcJve	phishing	campaigns	using	fake	
DocuSign	trying	to	trap	employees	into	
opening	them	up	
•  These	"secure	doc"	emails	are	one	of	the	
most	misflagged	categories	of	real	emails	
•  Users	have	trouble	figuring	out	whether	a	
"secure	doc"	email	is	real	or	a	phish
5	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
DocuSign	Phishing	A/ack	on	Company	FOO
6	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
Use	Case	Setup	
Ã  On	4/10,	a	user	named	Ethan	V	at	Company	Foo	submits	a	security	:cket	complaining	about	a	
poten:al	Phishing	Email.		
Ã  The	Details	provided	by	the	Ethan	V	in	the	Jcket	are	the	following	
–  Ethan	receives	an	email	from	an	internal	employee	Sonja	Lar	who	works	on	the	Finance	TEam	
–  The	email	states	that	a	signature	is	required	for	a	new	Docu-Sign	document	for	a	new	Stock	OpJon	grant	
for	granted	to	Ethan	
–  There	is	a	link	in	the	email	to	the	Docu-Sign	Document	
–  Ethan	clicks	on	the	link,	and	login	appears	
–  Ethan	enters	his	SSO	creden:als	and	submits	
–  On	submission,	nothing	happens	
–  Ethan	calls	Sonja	but	Sonja	states	she	didn’t	send	an	email	
–  Ethan	is	worried	and	then	files	help	desk	security	:cket	
Ã  A	security	:cket	is	created	and	assigned	to	the	SOC	Team	
Ã  A	SOC	analyst	James	picks	up	the	case	to	invesJgate	it.
7	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
Typical	Workflow	if	Company	Foo	
uses	tradi:onal	SIEM	tool
8	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
Systems	Accessed	for	Inves:ga:on/Context	
“InvesJgaJon”	
Workflow	Steps	
•  Step	1:	Analyst	James	searches	in	SIEM	for	
any	events	associated	with	the	user	Sonja	
over	the	last	24	hours	
•  Step	1	Result:	Most	events	are	coming	from	
IP	Y.	But	few	events	from	from	IP	X	where	
she	is	sending	email	via	Corp	Gmail	account.		
•  Step	2:	James	does	geo-lookup	of	IP	X	and	Y	n	
Maxmind	
•  Step	2	Result:	IP	X	is	from	Ireleand	and	IP	y	is	
from	Southern	Cali	
•  Step	3	Corp	Foo	has	offices	in	Ireland	&	Los	
Angeles.	James	files	a	Jcket	with	AD	team	to		
find	groups	that	Sonja	belongs	to.		
•  Step	3	Result:	The	groups	she	belongs	to	is	
only	associated	with	Los	Angeles	and	not	
Ireland	
Story	Unfolding	
•  Step	1	Insight:	Anomalous	Event	–	
Corp	Gmail	was	decommissioned	
on	behalf	of	exchange	months	
back	and	only	few	users	are	
currently	using	it		
•  Step	2	Insight:	Not	possible	for	
the	same	user	be	logging	in	from	
Ireland	&	Southern	Cali	at	the	
same	Jme.		
•  Step	3	Insight:	Unauthorized	
access	is	occurring	from	Ireland	
SIEM	
Search	
1
Maxmind	
(IP	Geo	DB)	
2
AD					
(IdenJty	
Mgmt.)	
3
•  Step	4:	James	logs	into	Foo’s	Asset	Mgmt	
system	to	determine	asset	the	IP	belong	to	
•  Step	4	Result:	IP	Y	is	from	Sonja’s	workstaJon	
while	IP	X	is	an	unidenJfied	Asset	
•  Step	4	Insight:	Seems	like	Sonja	
is	in	Southern	Cali	but	someone	
else	pretending	to	be	her	is	
logging	in	from	unidenJfied	Asset	
Asset	Mgmt.	
Inventory	
4
•  Step	5:	James	log	into	Soltra	a	threat	intel	
aggregaJon	service	to	see	if	IP	X	has	a	threat	
intel	hit.		
•  Step	5	Result:	IP	X	has	a	threat	intel	hit	and	
Sonja’s	account	is	immediately	shutdown	&		
Ethan’s	credenJals	have	been	reset	
•  Step	5	Insight:	Sonja’s	account	
has	been	compromised.	Shut	it	
down	and	Ethan’s	credenJals	
have	been	reset.	But	what	others	
users	are	affected	like	Ethan?	
Soltra	
(Threat	
Intel)	
5
9	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
Systems	Accessed	
for	Threat	Scope	
	
Systems	Accessed	
for	Forensics	
	
Systems	Accessed	for	Inves:ga:on/Context	
SIEM	
“Scope	of	Threat”	
Workflow	Steps	
•  Step	6:	Searches	SIEM	for	Fireye	and	IronPort	
email	events	associated	with	Sonja.	The	SIEM	
doesn’t	have	that	info	
•  Step	6	Result:	Need	to	log	into	Fireye	and	
IronPort	
•  Step	7:	Log	into	Fireye	Email	Threat	
PrevenJon	Cloud	&	IronPort	to	find	all	emails	
sent	from	Sonja	from	that	malicious	IP	
•  Step	7	Result:	Have	a	list	of	all	users	that	the	
Phishing	email	was	sent	to.	Can	reset	the	
password	for	all	those	users	
Maxmind	
(IP	Geo	DB)	
AD					
(IdenJty	
Mgmt.)	
Asset	Mgmt.	
Inventory	
Soltra	
(Threat	
Intel)	
Story	Unfolding	
•  Step	1	Insight:	Anomalous	Event	–	
Corp	Gmail	was	decommissioned	
on	behalf	of	exchange	months	
back	and	only	few	users	are	
currently	using	it		
•  Step	2	Insight:	Not	possible	for	
the	same	user	be	logging	in	from	
Ireland	&	Southern	Cali	at	the	
same	Jme.		
•  Step	3	Insight:	Unauthorized	
access	is	occurring	from	Ireland	
•  Step	4	Insight:	Seems	like	Sonja	
is	in	Southern	Cali	but	someone	
else	pretending	to	be	her	is	
logging	in	from	unidenJfied	Asset	
•  Step	5	Insight:	Sonja’s	account	
has	been	compromised.	Shut	it	
down	and	Ethan’s	credenJals	
have	been	reset.	But	what	others	
users	are	affected	like	Ethan?	
•  Step	6	Insight:	SIEM	doesn’t	have	
all	the	fireye	email	events	I	need	
to	determine	scope	
•  Step	7	Insight:	Understand	the	
scope	of	the	threat	and	can	can	
contain	it.		
“Forensics”	
Workflow	Steps	
•  Step	8:	Logs	into	Cisco	IronPort	to	determine	
when	the	a0acker	first	compromised	Sonja’s	
Gmail	account	
•  Step	8	Result:	On	3/26,	a	user	from	Ireleand	
logged	into	Sony’s	Corp	Gmail	Account	
•  Step	8	Insight:	Understands	when	
Sonja’s	Gmail	Account	was	first	
compromised	
•  Step	9:	Logs	into	Intermedia,	an	email	
archive	system,	to	understand	how	the	
account	was	compromised	
•  Step	9	Result:	Sees	a	set	of	emails	where	the	
a0acker	spoofed	someone	else	email	
address	“warmed	up’		her	with	a	few	emails	
and	then	sent	an	email	with	an	link	that	
Sonja	clicked	on	which	stole	her	credenJals	
from	her	chain	
•  Step	9	Insight:	Understand	how	
Sonja’s	account	got	compromised	
Systems	Accessed	for	Remedia:on	
Exchange	
(Primary	
Email	Service)	
Corp	Gmail	
(Secondary	
Email	Service)	
AD	&	SSO	
(IdenJty	Provider	
&	SSO)	
Search	
1
2 3 4 5
6
FireEye		
(Email		
Cloud		Security	)	
7
Cisco	IronPort	
(Email		
On-Premise	
Security	)	
8
Intermedia	
(Email	Archive)	
9
10	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
The	“Threat	Story”	the		Workflow	Told….
11	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
The Challenges faced by the SOC Analyst to Create this Story…
Challenge
•  The analyst had to jump from the SIEM to
more than 7 different tools that took up
valuable time.
•  It took more than 24 hours across 2 SOC
shifts to investigate, determine scope,
remediate and do further forensics/
investigation.
•  Half of my time was spending getting the
context needed for me to create the story
•  The threat was detected too late. Instead of
detecting the incident on 4/9, the threat should
have been detected on 3/20 when the attacker
spoofed Sonja’s email address
Need
•  Want a Centralized View of my data so I don’t
have to jump around and learn other tools
Eliminate manual tasks to investigate a case
•  Need to discover bad stuff quicker
•  Need the System to create the context for me
in real-time
•  The current static rules in the SIEM didn’t
detect the threat. Need smart analytics based
on:
•  User	Sonja	hasn’t	used	corp	gmail	in	the	last	3	months	
•  User	Sonja	can’t	login	from	Ireland	and	Southern	Cali	at	the	
same	Jme
12	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
Same	Workflow	if	Company	Foo	
used	Apache	Metron
13	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
Demo
14	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
Do	Inves:ga:on,	Find	Scope	and	Perform	Forensics	Using	only	Metron	
Systems	Accessed	for	RemediaJon	
Exchange	
(Primary	
Email	Service)	
Corp	Gmail	
(Secondary	
Email	Service)	
AD	&	OKTA	
(IdenJty	Provider	
&	SSO)	
Maxmind	
(IP	Geo	DB)	
AD					
(IdenJty	
Mgmt.)	
Asset	Mgmt.	
Inventory	
Soltra	
(Threat	
Intel)	
Systems	Accessed	for	InvesJgaJon/Context	
Systems	Accessed	
to	Determine	Scope	
	
FireEye		
(Email		
Cloud		Security	)	
Cisco	IronPort	
(Email		
On-Premise	
Security	)	
Intermedia	
(Email	Archive)	
Systems	Accessed	
for	Forensics
15	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
Do	Inves:ga:on,	Find	Scope	and	Perform	Forensics	Using	only	Metron	
Metron	will	make	it	easier	and	faster	to	find	
the	real	issues	I	need	to	act	on	with	real-Jme	enrichment	
Provides	Single	Pane	of	Glass	for	InvesJgaJon,	Scope	Analysis	and	Forensics	
Metron	can	take	everything	that	is	known	about	a	threat	and	check	for	it	in	real	
Jme		
For	Advanced	Persistent	Threats	(APT),	Metron	can	model	historical	behavior	of	
whoever	I	am		impersonaJng	and	flag	me	as	I	try	to	deviate
16	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
Metron	Architecture	
Network Data
(PCAP, Netflow, Bro, etc)
IDS
(suricata, Snort, etc)
Threat Intelligence Feeds
(Soltra, OpenTaxi, Third
party Feeds)
Security Endpoint Devices
(Fireye, Palo Alto, BlueCoat,
etc..)
Telemetry
Data Sources
Machine Generated Logs
(AD, App/Web Server,
Firewall, VPN, etc.)
Telemetry
Parsers
TELEMETRYINGESTBUFFER
Enrichment
Indexers &
Writers
Telemetry
Parsers
Real-Time Processing
Cyber Security Engine
Threat Intel Alert Triage
Cyber Security
Stream Processing Pipeline
DATASERVICES&INTEGRATIONLAYER
Modules
Community Analytical
Models
Search and
Dashboarding
Portal
Security Data Vault
Provisioning, Mgmt &
Monitoring
Performant
Network
Ingest
Probes
Real-Time
Enrich/
Threat Intel
Streams
Telemetry
Data Collectors
/ Other..
17	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
Real-Jme	Processing	Engine	
PCAP	
NETFLOW	
DPI	
IDS	
AV	
EMAIL	
FIREWALL	
HOST	LOGS	
Telemetry Event Buffer
1
PARSE	
NORMALIZE	
TAG	
VALIDATE	
PROCESS	
2
USER	
ASSET	
GEO	
WHOIS	
CONN	
ENRICH	
3
STIX	
Flat	Files	
Aggregators	
Model	As	A	
Service	
Cloud		
Services	
LABEL	
4
PCAP	
Store	
ALERT	
PERSIST	
Alert	
Security	Data		
Vault	
5
Network		
Tap	
7a
Fast Telemetry Ingest
Telemetry Ingest
7b
Custom Performant
Probes
Custom	Metron	UI/Portals	
Real-Time	
Search	
InteracJve	
Dashboards	
Data	
Modelling	
IntegraJon	
Layer	
PCAP	
Replay	
Security	
Layer	
Data	&	Integra:on	Services	
6
Apache Metron
Apache	Metron	Logical	Architecture
18	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
Analy:cs
19	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
Old	School	vs.	New	School	Security	Controls	
Email	
Security	
Rules	
Firewall	
Rules	
IDS	Rules	 Sandbox	
Rules	
DLP	Rules	Old	School	->	
(1-1)	
New	School	->	
(1-*)	
Email	
Classifier	 Alerts	Triage	
Malware	
Family	
Classifier	
Network	
Behavior	
Classifier	
UEBA	System
20	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
Analy:cs	
DescripJve	 DiagnosJc	 PredicJve	 PrescripJve	
Metron	Security	Data	AnalyJcs	Plavorm	
HDF	 HDP	
Deep	
Packet	
Model	as	a	Service	
Nevlow	
Applianc
e	Logs	
Alerts	
Host	
Logs	
Geo	
Enrich	
Host	
Enrich	
App.	
Enrich	
IdenJty	
Enrich	
Domain	
Enrich	
Social	
Media	
Email	
Chat	
Forums	
Playbook	
Wokflow	HR	
IR	Mobile	
Devices	
Machine	
Exhaust	 IoT	
Datasets	Access	
Logs	
Malware	
Binaries	 Sandbox	
Honeypo
t	
DecepJo
n	
SaaS	
Business		
Enrich	
CMDB	
Enrich	
Compl.	
Enrich	
Knowled
ge	Graph	
EnJty	
Profiles	
InteracJ
on	Graph	
Web	
Mining	
Use	Cases	
Insider	
Threat	
Data	
Access	
Manage
ment	
Breach	
DetecJon	
ExfiltraJon	
Lateral	
Movement	
Malware	
DetecJon	
Alerts	
Triage	
RemediaJon
21	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
Thank	You	
George	VeFcaden		&	James	Sirota	
Apache	Metron	Commi/ers
22	 ©	Hortonworks	Inc.	2011	–	2016.	All	Rights	Reserved	
	
Learn,	Share	at	Birds	of	a	Feather	
		Streaming,	DataFlow	&	Cybersecurity	
Thursday	June	30	
6:30	pm,	Ballroom	C

Más contenido relacionado

La actualidad más candente

How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
Michael Soltys
 
Ceh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applicationsCeh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applications
Mehrdad Jingoism
 

La actualidad más candente (20)

Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...
 
Security & Compliance for Startups
Security & Compliance for StartupsSecurity & Compliance for Startups
Security & Compliance for Startups
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 
Detect Threats Faster
Detect Threats FasterDetect Threats Faster
Detect Threats Faster
 
Holy Threat Intelligence AMPman! We Need Endpoint Security!
Holy Threat Intelligence AMPman! We Need Endpoint Security!Holy Threat Intelligence AMPman! We Need Endpoint Security!
Holy Threat Intelligence AMPman! We Need Endpoint Security!
 
News bytes-July 2013
News bytes-July 2013News bytes-July 2013
News bytes-July 2013
 
Cyber security[1118]
Cyber security[1118]Cyber security[1118]
Cyber security[1118]
 
China Cyber
China CyberChina Cyber
China Cyber
 
State of Internet 1H 2008
State of Internet 1H 2008State of Internet 1H 2008
State of Internet 1H 2008
 
P50 fahl
P50 fahlP50 fahl
P50 fahl
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
 
Ceh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applicationsCeh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applications
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
Spy android malware - eScan
Spy android malware - eScanSpy android malware - eScan
Spy android malware - eScan
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Security Risks of Uneducated Employees
Security Risks of Uneducated EmployeesSecurity Risks of Uneducated Employees
Security Risks of Uneducated Employees
 
Cisco Content Security
Cisco Content SecurityCisco Content Security
Cisco Content Security
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 

Destacado

Presentation Training Part 1 Preparation
Presentation Training Part 1 PreparationPresentation Training Part 1 Preparation
Presentation Training Part 1 Preparation
Spike Gu
 

Destacado (20)

Tracing your security telemetry with Apache Metron
Tracing your security telemetry with Apache MetronTracing your security telemetry with Apache Metron
Tracing your security telemetry with Apache Metron
 
Apache Metron: Community Driven Cyber Security
Apache Metron: Community Driven Cyber Security Apache Metron: Community Driven Cyber Security
Apache Metron: Community Driven Cyber Security
 
Apache Metron Meetup May 4, 2016 - Big data cybersecurity
Apache Metron Meetup May 4, 2016 - Big data cybersecurityApache Metron Meetup May 4, 2016 - Big data cybersecurity
Apache Metron Meetup May 4, 2016 - Big data cybersecurity
 
Apache metron - An Introduction
Apache metron - An IntroductionApache metron - An Introduction
Apache metron - An Introduction
 
Performance Comparison of Streaming Big Data Platforms
Performance Comparison of Streaming Big Data PlatformsPerformance Comparison of Streaming Big Data Platforms
Performance Comparison of Streaming Big Data Platforms
 
Cisco OpenSOC
Cisco OpenSOCCisco OpenSOC
Cisco OpenSOC
 
유전 알고리즘으로 패킷 필터링 규칙 만들기
유전 알고리즘으로 패킷 필터링 규칙 만들기유전 알고리즘으로 패킷 필터링 규칙 만들기
유전 알고리즘으로 패킷 필터링 규칙 만들기
 
Open Security Operations Center - OpenSOC
Open Security Operations Center - OpenSOCOpen Security Operations Center - OpenSOC
Open Security Operations Center - OpenSOC
 
Rkil group presentation
Rkil group presentationRkil group presentation
Rkil group presentation
 
Presentation Training Part 1 Preparation
Presentation Training Part 1 PreparationPresentation Training Part 1 Preparation
Presentation Training Part 1 Preparation
 
IDEAS, INNOVACIÓN Y ACTITUDES EMPRENDEDORAS UN DESAFÍO PARA LA EDUCACIÓN DEL ...
IDEAS, INNOVACIÓN Y ACTITUDES EMPRENDEDORAS UN DESAFÍO PARA LA EDUCACIÓN DEL ...IDEAS, INNOVACIÓN Y ACTITUDES EMPRENDEDORAS UN DESAFÍO PARA LA EDUCACIÓN DEL ...
IDEAS, INNOVACIÓN Y ACTITUDES EMPRENDEDORAS UN DESAFÍO PARA LA EDUCACIÓN DEL ...
 
AAU Summer School-Clean tech at sea
AAU Summer School-Clean tech at seaAAU Summer School-Clean tech at sea
AAU Summer School-Clean tech at sea
 
Ashwini_2.8Yrs Exp
Ashwini_2.8Yrs ExpAshwini_2.8Yrs Exp
Ashwini_2.8Yrs Exp
 
Wikimania Esino Lario at Wikimedia CH April 2016
Wikimania Esino Lario at Wikimedia CH April 2016Wikimania Esino Lario at Wikimedia CH April 2016
Wikimania Esino Lario at Wikimedia CH April 2016
 
Sheffield Rodrigo 4to 1ra
Sheffield Rodrigo 4to 1raSheffield Rodrigo 4to 1ra
Sheffield Rodrigo 4to 1ra
 
ACCIONA Q1 2015 Results Report
ACCIONA Q1 2015 Results ReportACCIONA Q1 2015 Results Report
ACCIONA Q1 2015 Results Report
 
40 Ways to Boost Year-End Appeals with Social Media
40 Ways to Boost Year-End Appeals with Social Media40 Ways to Boost Year-End Appeals with Social Media
40 Ways to Boost Year-End Appeals with Social Media
 
Elementos y mecanismos de discriminación que sufren las mujeres
Elementos y mecanismos de discriminación que sufren las mujeresElementos y mecanismos de discriminación que sufren las mujeres
Elementos y mecanismos de discriminación que sufren las mujeres
 
Decoración de habitaciones para niños
Decoración de habitaciones para niñosDecoración de habitaciones para niños
Decoración de habitaciones para niños
 
Propuestaactividadparablog (1)
Propuestaactividadparablog (1)Propuestaactividadparablog (1)
Propuestaactividadparablog (1)
 

Similar a War on stealth cyber attacks phishing docusign apache metron

NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
North Texas Chapter of the ISSA
 
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsStop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Invincea, Inc.
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 

Similar a War on stealth cyber attacks phishing docusign apache metron (20)

NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
 
Malicious malware breaches - eScan
Malicious malware breaches - eScanMalicious malware breaches - eScan
Malicious malware breaches - eScan
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
Open Source Insight:  Equifax, Apache Struts, & CVE-2017-5638 VulnerabilityOpen Source Insight:  Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
 
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsStop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
 
A Secure Network Bridging the Gap
A Secure Network Bridging the GapA Secure Network Bridging the Gap
A Secure Network Bridging the Gap
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Jameel Nabbo Cyber Security conference
Jameel Nabbo Cyber Security conference Jameel Nabbo Cyber Security conference
Jameel Nabbo Cyber Security conference
 
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityEverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in Cybersecurity
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software development
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat ReportTECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
 
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpBy Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
 
Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015
 

Último

Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
Bertram Ludäscher
 
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
vexqp
 
Jual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
Jual Cytotec Asli Obat Aborsi No. 1 Paling ManjurJual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
Jual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
ptikerjasaptiker
 
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
vexqp
 
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
Health
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
nirzagarg
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
nirzagarg
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
Gartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxGartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptx
chadhar227
 

Último (20)

Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt
 
Aspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraAspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - Almora
 
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
 
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
 
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book nowVadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
 
Jual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
Jual Cytotec Asli Obat Aborsi No. 1 Paling ManjurJual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
Jual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
 
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
 
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
 
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24  Building Real-Time Pipelines With FLaNKDATA SUMMIT 24  Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
 
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptx
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptxThe-boAt-Story-Navigating-the-Waves-of-Innovation.pptx
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptx
 
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With OrangePredicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
 
Capstone in Interprofessional Informatic // IMPACT OF COVID 19 ON EDUCATION
Capstone in Interprofessional Informatic  // IMPACT OF COVID 19 ON EDUCATIONCapstone in Interprofessional Informatic  // IMPACT OF COVID 19 ON EDUCATION
Capstone in Interprofessional Informatic // IMPACT OF COVID 19 ON EDUCATION
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
 
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
Gartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxGartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptx
 

War on stealth cyber attacks phishing docusign apache metron