
Sign up to save your podcasts
Or


Beacon analysis is an integral part of threat hunting. If you are not looking for beacons you take the chance of missing compromised IoT devices or anything that does not have a threat mitigation agent installed. I'll talk about what makes beacon hunting so hard, and how the open source tool RITA can simplify the process.
***Powerpoint Slides in Full Show Notes***
Full Show Notes: https://wiki.securityweekly.com/Episode574
Visit our website: http://securityweekly.com
Follow us on Twitter: https://www.twitter.com/securityweekly
By Paul Asadoorian5
22 ratings
Beacon analysis is an integral part of threat hunting. If you are not looking for beacons you take the chance of missing compromised IoT devices or anything that does not have a threat mitigation agent installed. I'll talk about what makes beacon hunting so hard, and how the open source tool RITA can simplify the process.
***Powerpoint Slides in Full Show Notes***
Full Show Notes: https://wiki.securityweekly.com/Episode574
Visit our website: http://securityweekly.com
Follow us on Twitter: https://www.twitter.com/securityweekly

2,011 Listeners

363 Listeners

148 Listeners

83 Listeners

79 Listeners

651 Listeners

5 Listeners

8,077 Listeners

51 Listeners

315 Listeners
![Talkin' Bout [Infosec] News by Black Hills Information Security](https://podcast-api-images.s3.amazonaws.com/corona/show/516141/logo_300x300.jpeg)
94 Listeners

139 Listeners

168 Listeners