Header of Splunk

5 Tactics for How Attackers Evade Security Analysis

We show how phishers design their attacks to bypass analysis and detection measures. We highlight five tactics.

Topic

Education and trainingAwareness / Phishing / FraudCloud SecuritySIEM / Threat Analytics / SOC

When & Where

calendar_month

Tue, 10/22/2024, 12:45 - 13:00

location_on

Forum, Booth 7A-106

Download session as iCaldownload_for_offline

Details

  • Format:

    Technology lecture

Session description

Phishing attacks are constantly evolving, and attackers are increasingly using sophisticated methods to deceive security teams. In this presentation, we will demonstrate how phishers design their attacks to bypass analysis and detection measures. We will highlight five particularly effective tactics that are commonly found in modern phishing kits. Learn how attackers are outsmarting security teams and how you can protect yourself against these advanced methods. Stay one step ahead of the attackers in this cat-and-mouse game.

Moderator