Final-Connect-Image.jpg

Exposing Attacker Activity

Posted by Nenad Kreculj   |   July 17, 2012

This video post is one in a series of technical blog posts examining various attack scenarios through video simulations of CounterTack’s Event Horizon platform. Today, CounterTack’s Nenad Kreculj exposes some tactics cyber attackers use to hide their actions.

Topics: Cyber Security, Cyber attack intelligence, virtual machine introspection, Event Horizon

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all