
Sandman doesn't slow malware down. [Research Saturday]
CyberWire Daily
00:00
The limitations of legacy SIM and the complexities of identifying new clusters
This chapter discusses the drawbacks of relying on legacy SIM systems for incident detection and highlights the advantages of Hunter's SOC platform. The speakers also cover topics such as APT groups' C2 infrastructure, sentiment sophistication, third-party vendors supplying malware, identifying new activity clusters, diagnosing mercenary groups, and telco involvement in cyber attacks.
Play episode from 11:47
Transcript


