Cobalt Strike started out as a powerful tool for Adversary Simulations and Red Team operations. Its framework is a robust tool to help organizations test their defenses and prepare for a variety of attacks. However, it has also become a platform for various malicious actors to deploy real attacks against a variety of targets. Organizations must be prepared for this dangerous attack technique.
Join Yuval Fischer, Cyber Operations Analyst for the Cynet MDR Team, as he breaks down Cobalt Strike, it’s appearances in the wild, and how it’s used to penetrate organizations’ defenses. We’ll also show how Cynet can defend you against this threat.
What Cobalt Strike is, how it works, and why it’s so popular among malicious actors
Instances in the wild, and what they can tell us about how Cobalt Strike is used
How Cynet can defend against Cobalt Strike-based attacks
Cobalt Strike started out as a powerful tool for Adversary Simulations and Red Team operations. Its framework is a robust tool to help organizations test their defenses and prepare for a variety of attacks. However, it has also become a platform for various malicious actors to deploy real attacks against a variety of targets. Organizations must be prepared for this dangerous attack technique.
Join Yuval Fischer, Cyber Operations Analyst for the Cynet MDR Team, as he breaks down Cobalt Strike, it’s appearances in the wild, and how it’s used to penetrate organizations’ defenses. We’ll also show how Cynet can defend you against this threat.
What Cobalt Strike is, how it works, and why it’s so popular among malicious actors
Instances in the wild, and what they can tell us about how Cobalt Strike is used
How Cynet can defend against Cobalt Strike-based attacks
Yuval Fischer, Cyber Operations Analyst for the Cynet MDR Team, is an experienced malware analyst and incident responder. He served in the Israeli Defense Forces as a combat medic in the K9 unit, and is a CTF Addict (specifically in HTB and THM). Yuval is the creator and a contributor for yuhan4.com, an Israeli website dedicated to cyber and information security. Recently, Yuval has published several research deep dives, including a recent report on Process Injection techniques.
1:00 PM EST | 1:00 PM PST
1:00 PM GMT | 1:00 PM CST
14th April -
15th April -
This webinar will discuss:
This webinar will discuss:
By clicking submit I consent to the use of my personal data by Cynet in accordance with Cynet's Privacy Policy and by its partners