Inside You’ll Find
An analysis of 500,000+ attacks on our perimeter-facing decoys following the COVID-19 outbreak. We look at:
- What were the top Internet-facing assets targeted by adversaries? Where did these attacks originate from?
- What were the various tactics that attackers used to stay under the radar and avoid detection in a work from home world?
- What were the different TTPs and open source/community tools that hackers used to execute attacks?
- Strategic and tactical recommendations from our threat hunting team that you can implement to mitigate perimeter threats.
Grab Your Copy
Much dreaded form coming up
We hate forms too but this one will help us get to know each other. Promise