endpoint security: amplified

Final-Connect-Image.jpg

Exposing Attacker Activity

This video post is one in a series of technical blog posts examining various attack scenarios through video simulations of CounterTack’s Event Horizon platform. Today, CounterTack’s Nenad Kreculj exposes some tactics cyber attackers use to hide their actions.

Read More

Topics: Cyber Security, Cyber attack intelligence, virtual machine introspection, Event Horizon

How Hackers Hide Their Tracks: Part 1

This is the first in a series of technical blog posts examining various attack scenarios through video simulations of CounterTack’s Event Horizon platform.   

Read More

Topics: APT, virtual machine introspection, Detecting in-progress attack, Event Horizon

Subscribe to Email Updates

Posts by Topic

see all