Artwork

Вміст надано Team Cymru. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Team Cymru або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
Player FM - додаток Podcast
Переходьте в офлайн за допомогою програми Player FM !

Threat Hunter Ryan Chapman on Critical Security Mistakes Against Ransomware

25:45
 
Поширити
 

Manage episode 450358464 series 3505153
Вміст надано Team Cymru. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Team Cymru або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.

In our latest episode of the Future of Threat Intelligence podcast, David chats with Ryan Chapman, Threat Hunter, Author & Instructor at SANS Institute. They explore the alarming evolution of ransomware tactics, including the rise of multi-extortion strategies where attackers not only encrypt data but also threaten to leak sensitive information.

Ryan emphasizes the critical mistakes organizations make, such as failing to implement basic security practices and allowing administrative privileges for general users. He also discusses the importance of leveraging internal data for effective threat hunting. Tune in to gain insights on strengthening your organization's defenses against ransomware attacks!

Topics discussed:

  • The evolution of ransomware tactics, highlighting the shift from simple encryption to sophisticated human-operated attacks.
  • The rise of multi-extortion strategies, where attackers threaten to leak sensitive data in addition to encrypting it.
  • Why organizations often fail to implement basic security practices, leading to increased vulnerability to ransomware attacks.
  • The importance of restricting administrative privileges for general users is emphasized to enhance overall security posture.
  • The value of better visibility through proper logging and monitoring to detect and respond to threats effectively.
  • Leveraging internal data as intelligence is crucial for effective threat hunting and identifying potential vulnerabilities within the organization.
  • The significance of ongoing education and training in cybersecurity to keep defenses robust against evolving threats.

Key Takeaways:

  • Implement basic security practices, such as restricting administrative privileges for general users, to reduce the risk of ransomware attacks.
  • Conduct regular audits of Active Directory permissions to ensure proper access controls and minimize potential vulnerabilities.
  • Utilize full tunnel VPNs for remote users to secure all traffic and enhance protection against external threats.
  • Enable comprehensive logging on hosts, including PowerShell and Active Directory events, to improve visibility and incident response capabilities.
  • Leverage internal data as intelligence by analyzing alerts and indicators of compromise (IOCs) to identify potential threats.
  • Educate employees on recognizing phishing attempts and other social engineering tactics to prevent initial access for attackers.
  • Collaborate with threat hunting teams to share insights and findings, fostering a proactive approach to cybersecurity.
  • Monitor for unusual service names or processes that appear on fewer devices to identify potential threats in your environment.
  • Document all findings during threat hunting sessions, regardless of whether a threat is identified, to build organizational knowledge.
  • Stay updated on the latest ransomware tactics and trends to adapt your security strategies and defenses accordingly.
  continue reading

69 епізодів

Artwork
iconПоширити
 
Manage episode 450358464 series 3505153
Вміст надано Team Cymru. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Team Cymru або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.

In our latest episode of the Future of Threat Intelligence podcast, David chats with Ryan Chapman, Threat Hunter, Author & Instructor at SANS Institute. They explore the alarming evolution of ransomware tactics, including the rise of multi-extortion strategies where attackers not only encrypt data but also threaten to leak sensitive information.

Ryan emphasizes the critical mistakes organizations make, such as failing to implement basic security practices and allowing administrative privileges for general users. He also discusses the importance of leveraging internal data for effective threat hunting. Tune in to gain insights on strengthening your organization's defenses against ransomware attacks!

Topics discussed:

  • The evolution of ransomware tactics, highlighting the shift from simple encryption to sophisticated human-operated attacks.
  • The rise of multi-extortion strategies, where attackers threaten to leak sensitive data in addition to encrypting it.
  • Why organizations often fail to implement basic security practices, leading to increased vulnerability to ransomware attacks.
  • The importance of restricting administrative privileges for general users is emphasized to enhance overall security posture.
  • The value of better visibility through proper logging and monitoring to detect and respond to threats effectively.
  • Leveraging internal data as intelligence is crucial for effective threat hunting and identifying potential vulnerabilities within the organization.
  • The significance of ongoing education and training in cybersecurity to keep defenses robust against evolving threats.

Key Takeaways:

  • Implement basic security practices, such as restricting administrative privileges for general users, to reduce the risk of ransomware attacks.
  • Conduct regular audits of Active Directory permissions to ensure proper access controls and minimize potential vulnerabilities.
  • Utilize full tunnel VPNs for remote users to secure all traffic and enhance protection against external threats.
  • Enable comprehensive logging on hosts, including PowerShell and Active Directory events, to improve visibility and incident response capabilities.
  • Leverage internal data as intelligence by analyzing alerts and indicators of compromise (IOCs) to identify potential threats.
  • Educate employees on recognizing phishing attempts and other social engineering tactics to prevent initial access for attackers.
  • Collaborate with threat hunting teams to share insights and findings, fostering a proactive approach to cybersecurity.
  • Monitor for unusual service names or processes that appear on fewer devices to identify potential threats in your environment.
  • Document all findings during threat hunting sessions, regardless of whether a threat is identified, to build organizational knowledge.
  • Stay updated on the latest ransomware tactics and trends to adapt your security strategies and defenses accordingly.
  continue reading

69 епізодів

Усі епізоди

×
 
Loading …

Ласкаво просимо до Player FM!

Player FM сканує Інтернет для отримання високоякісних подкастів, щоб ви могли насолоджуватися ними зараз. Це найкращий додаток для подкастів, який працює на Android, iPhone і веб-сторінці. Реєстрація для синхронізації підписок між пристроями.

 

Короткий довідник

Слухайте це шоу, досліджуючи
Відтворити