Using the MITRE ATT&CK Framework with Exabeam for Threat Hunting and Investigations

Sdílet
Vložit

Komentáře • 9

  • @carlosceoofredlinequickshift

    Good content.

  • @tonymitchell1283
    @tonymitchell1283 Před 4 lety

    Really useful - Exabeam is a fantastic product, just wish it was a little more affordable!

  • @abhinav02111987
    @abhinav02111987 Před 3 lety

    Very nicely explained. Thank you.

  • @LeStupiak193
    @LeStupiak193 Před 4 lety +2

    Hi , can somebody tell me what is the abbreviation of AV signature mentioned in his keynote presentation ?
    A virus signature ?

    • @ExabeamSIEM
      @ExabeamSIEM  Před 4 lety +3

      Hi there. The AV signature refers to the virus signature, its unique data, or bits of code... almost like a fingerprint.

    • @LeStupiak193
      @LeStupiak193 Před 4 lety +1

      Exabeam thanks for brighten things up ! Im a user of exabeam ! Your videos are really helpful and informative ! Thanks a lot !

  • @gsrpavan1987
    @gsrpavan1987 Před 4 lety +2

    Hi
    Is there a way to auto populate CVE s and use the same for threat hunting??

    • @ExabeamSIEM
      @ExabeamSIEM  Před 4 lety +3

      Hi Pavan. CVEs are part of the Pre-Att&CK framework. In the Att&CK framework, Exabeam ties detections to TTPs. The approach is CVE agnostic since most exploitation of vulnerabilities involve a new process execution, lateral movement, covering tracks, etc. Our goal is to provide visibility into detecting threats using a dynamic approach such as TTPs instead of a static indicator like IoCs.

  • @MrEmityushkin
    @MrEmityushkin Před 2 lety

    +