Register for the Webinar
In one of the largest ever sustained global cyber espionage campaigns known as Operation Cloud Hopper, a Chinese threat actor group dubbed APT10 was able to infiltrate managed IT service providers to gain unprecedented access to their clients' intellectual property and sensitive data. Leveraging "Red Leaves" malware, attackers were able to breach and freely move about laterally in their unsuspecting victims' environments.
- Why we threat hunt
- How new intel can kick off a threat hunt
- How to quickly hunt across your enterprise
- How to scale your future threat hunts leveraging automation