They Want Credentials, Control, and Chaos. Let’s Shut it Down!

Cybercriminals don’t wait for permission. They sneak in, move fast, and aim for maximum damage. But so do we.

In this session, we break down the real-world attacks our Security Operations Center (SOC) stopped before they could take businesses down. Here’s a taste:

  • Credential Theft in Telecom: An attacker quietly lurked for weeks, gathering credentials and mapping the Active Directory.
  • Cobalt Strike in Healthcare: A bad actor bypassed MFA in a New Jersey orthopedic network, pivoted with RDP, and prepped a Cobalt Strike beacon to phone home.
  • Brute-Force RDP in Food Wholesale: Attackers hammered their way into an RDP server, scanned the network, and modified firewall rules for persistence. 

Leave a Reply

Your email address will not be published. Required fields are marked *