This paper explains why its difficult to detect attack behavior and outline Cognitos key features, touching on such topics as Cognitos interface and how it helps analysts move faster and more effectively; how the platform finds useful data for threat hunting; and the role of network traffic analysis and AI in monitoring and responding to threats. They will also discuss the detection of unusual hosts, advanced threat hunting and how Cognitos various features (reporting, metadata, shared links and more) help simplify tasks.
This resource is not yet available. It will be published soon so stay tuned!
January 16, 2020
In today’s security environment, attackers’ goals are focused on data access and exfiltration. Sophisticated attackers often use advanced malware-based espionage that can aggressively pursue and compromise specific targets. These attacks can include social engineering tactics, such as spear-phishing attempts, and deeply implanted malware that stealthily impersonates actual user behavior. Also, once a compromise has occurred, attackers attempt to maintain a persistent presence within the victim’s network, escalate privileges and move laterally within the victim’s network to extract sensitive information to locations under the attacker’s control.