• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
learn how to build an incident response playbook against scattered

Learn How to Build an Incident Response Playbook Against Scattered Spider in Real-Time

You are here: Home / General Cyber Security News / Learn How to Build an Incident Response Playbook Against Scattered Spider in Real-Time
February 20, 2024

In the tumultuous landscape of cybersecurity, the 12 months 2023 left an indelible mark with the brazen exploits of the Scattered Spider danger group. Their attacks qualified the nerve facilities of main money and insurance plan institutions, culminating in what stands as 1 of the most impactful ransomware assaults in latest memory.

When organizations have no reaction plan in place for these types of an attack, it can develop into overpowering trying to prioritize the next steps that will have a compounding affect on the menace actor’s potential to retain obtain to and management around a compromised network.

Silverfort’s risk analysis workforce interacted closely with the identity threats used by Scattered Spider. and in truth, built a response playbook in authentic time to react to an active Scattered Spider attack. This webinar will dissect the true-lifetime circumstance in which they were named on to develop and execute a response plan whilst attackers were being going inside of an organization’s hybrid atmosphere.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Hear immediately from the Silverfort workforce about the troubles they faced, including how to speedily and competently (and in as automated a manner as possible) meet the adhering to reaction aims:

  • Set ‘roadblocks’ promptly in location to safeguard from more lateral movement from that stage forward
  • Pinpoint consumer accounts that ended up compromised, with a exclusive emphasis on assistance accounts (a favored Scattered Spider concentrate on)
  • Eradicate prospective destructive presence from the org’s identification infrastructure (again – a favorable and publicly documented Scattered Spider approach)

Furthermore, you will gain insights into the ways taken in reaction, concentrating on 3 proportions of lateral motion:

  • Person Accounts – We’ll seem at the needed guidelines and checking for services accounts, admin people, and domain buyers
  • Identification Infrastructure – We are going to talk about limiting person access, disabling insecure authentication protocols, and additional harden authentication prerequisites
  • Other Area-Joined Equipment – We are going to search at limiting inter-machine communication for user’s workstations, briefly blocking insecure authentication protocols

.webi-a-box{ history-shade: #f6f7fd padding: 25px border-radius: 10px } .webi-a-box h2 { color: #333 margin-best: } .webi-a-box .cta-button { screen: inline-block margin-leading: 20px padding: 10px 20px track record-colour: #4469f5 color: #ffffff !important border-radius: 5px textual content-decoration: none changeover: track record-shade .3s relieve }

Listen to firsthand from Silverfort’s gurus in our approaching webinar. Minimal spots available – secure yours now.

Reserve Your Webinar Place ➜

See you there!

Identified this article interesting? This post is a contributed piece from 1 of our valued companions. Observe us on Twitter  and LinkedIn to go through much more special articles we put up.


Some components of this short article are sourced from:
thehackernews.com

Previous Post: «critical flaws found in connectwise screenconnect software patch now Critical Flaws Found in ConnectWise ScreenConnect Software – Patch Now
Next Post: New Malicious PyPI Packages Caught Using Covert Side-Loading Tactics new malicious pypi packages caught using covert side loading tactics»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams
  • Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets
  • The Hidden Weaknesses in AI SOC Tools that No One Talks About
  • Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms
  • Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials
  • North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.