Hunting For Exploit Kits
Today, the most popular techniques used by adversaries to compromise systems are browser exploitation and email spam. Exploit kits are evolving, enabling red teams to repurpose the latest in-the-wild threats, and assisting vulnerability researchers to stay current on the latest exploits.
Endgame’s Malware Researcher, Joe Desimone, will talk about Endgame’s automated system that relies on behavioral exploit detection rolled into a sandbox that continually crawls popular websites for infection. The system captures a steady stream of exploit kit samples such as Neutrino, RIG, and Magnitude.
Watch this webinar to learn:
- The exploitation process
- How to catch an exploit kit
- Real-life threats and how to test your defenses against them