Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of Splunk
Forums it-sa Expo Knowledge Forum D

5 Tactics for How Attackers Evade Security Analysis

We show how phishers design their attacks to bypass analysis and detection measures. We highlight five tactics.

calendar_today Wed, 23.10.2024, 12:45 - 13:00

event_available On site

place Forum, Booth 7A-106

Action description

south_east

Speaker

south_east

Themes

Education and training Awareness / Phishing / Fraud Cloud Security SIEM / Threat Analytics / SOC

Key Facts

  • Bypass analyses and detection measures#Demonstrate 5 effective tactics

Organizer

Event

This action is part of the event Forums it-sa Expo

Action description

Phishing attacks are constantly evolving, and attackers are increasingly using sophisticated methods to deceive security teams. In this presentation, we will demonstrate how phishers design their attacks to bypass analysis and detection measures. We will highlight five particularly effective tactics that are commonly found in modern phishing kits. Learn how attackers are outsmarting security teams and how you can protect yourself against these advanced methods. Stay one step ahead of the attackers in this cat-and-mouse game. ... read more

Language: German

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.