You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

2.2 KiB

1TimestampWhich CERT NZ Phase does this content align with? Read more about these in the CERT NZ Ransomware guide linked above. They are represented by the "Circle" shapes in the diagram. What's the Title of the contentWhat's the Description of the contentWhat Type is the content?Where is the content located (URL or ID for .conf) ?Content Id (if applicable)Email Address
23/28/2022 15:44:22Internet-exposed services, Patching, Multi-factor authentication (MFA), Disable macros, Application allowlisting, Logging and alerting, Password manager, Principle of least privilege, Network segmentation, BackupsHow ransomware happens and how to stop itRansomware attacks are becoming increasingly common and sophisticated. This is how CERT NZs critical controls can help you stop a ransomware attack in its tracks.Bloghttps://www.cert.govt.nz/it-specialists/guides/how-ransomware-happens-and-how-to-stop-it/N/A
33/29/2022 15:35:08Internet-exposed services, Patching, Multi-factor authentication (MFA), Disable macros, Application allowlisting, Logging and alerting, Password manager, Principle of least privilege, Network segmentation, BackupsHow Ransomware Happens, and how to stop itOverview of possible avenues an attack can occur and the path it takes. Followed by the critical controls you can put into place to help make things a bit harder for the actor. Bloghttps://www.cert.govt.nz/it-specialists/guides/how-ransomware-happens-and-how-to-stop-it/
45/13/2022 10:46:36PhishingAnatomy of an Attack"This session covers how an actual phishing attack from APT29 came together. We will discuss how incident responders can learn more about the attack and build out a timeline of key events. We will also explain how DNS based security plays an important role in proactively blocking threats and how integrations with Splunk can help you with effective threat hunting." From .conf19, session SECS3014 Special thanks and credit to Mark Stanford, Cisco Systems and SplunkVideohttps://www.youtube.com/watch?v=T-R61ieh5p0jbjerke@splunk.com
55/13/2022 10:47:59Password guessingBrute Force Attack in SplunkRecorded at Black Hat Training on July 31, 2021Videohttps://www.youtube.com/watch?v=XCqXCPB37Esjbjerke@splunk.com