
Sign up to save your podcasts
Or
Beacon analysis is an integral part of threat hunting. If you are not looking for beacons you take the chance of missing compromised IoT devices or anything that does not have a threat mitigation agent installed. I'll talk about what makes beacon hunting so hard, and how the open source tool RITA can simplify the process.
***Powerpoint Slides in Full Show Notes***
Full Show Notes: https://wiki.securityweekly.com/Episode574
Visit our website: http://securityweekly.com
Follow us on Twitter: https://www.twitter.com/securityweekly
5
22 ratings
Beacon analysis is an integral part of threat hunting. If you are not looking for beacons you take the chance of missing compromised IoT devices or anything that does not have a threat mitigation agent installed. I'll talk about what makes beacon hunting so hard, and how the open source tool RITA can simplify the process.
***Powerpoint Slides in Full Show Notes***
Full Show Notes: https://wiki.securityweekly.com/Episode574
Visit our website: http://securityweekly.com
Follow us on Twitter: https://www.twitter.com/securityweekly
1,968 Listeners
627 Listeners
363 Listeners
148 Listeners
79 Listeners
1,003 Listeners
3 Listeners
5 Listeners
16 Listeners
7,875 Listeners
51 Listeners
187 Listeners
90 Listeners
76 Listeners
129 Listeners