Join us for an expert-led webinar as we explore new attacker techniques and tradecraft.
Join us for an expert-led webinar as we explore new attacker techniques and tradecraft.
Join us for an expert-led webinar as we explore new attacker techniques and tradecraft.
Join us for an expert-led webinar as we explore new attacker techniques and tradecraft.
Join us for an expert-led webinar as we explore new attacker techniques and tradecraft.
Join us for an expert-led webinar as we explore new attacker techniques and tradecraft.
In this live session, we delve into the crucial topic of GenAI abuse, specifically how attackers harness the power of LLMs like Microsoft Copilot for M365 to execute their attacks at even greater speed and broader scale. As enterprises rapidly adopt Microsoft Copilot for M365, as do attackers. Discover how cybercriminals will abuse Microsoft Copilot for M365 to run jailbreak techniques, compromise more identities, and conduct recon and discovery in a matter of minutes.
Our seasoned attack lab security engineer will delve into the advanced techniques of the latest tradecrafts and most importantly, highlight the ways SOC teams can detect, disarm and disrupt these attacks.
In this 30-minute session you will:
Can't make it to the live session? No worries! Simply register to receive the recording and catch up at your convenience. Also, feel free to share this invitation with any colleagues interested in this vital topic.
In this live session, we delve into the crucial topic of GenAI abuse, specifically how attackers harness the power of LLMs like Microsoft Copilot for M365 to execute their attacks at even greater speed and broader scale. As enterprises rapidly adopt Microsoft Copilot for M365, as do attackers. Discover how cybercriminals will abuse Microsoft Copilot for M365 to run jailbreak techniques, compromise more identities, and conduct recon and discovery in a matter of minutes.
Our seasoned attack lab security engineer will delve into the advanced techniques of the latest tradecrafts and most importantly, highlight the ways SOC teams can detect, disarm and disrupt these attacks.
In this 30-minute session you will:
Can't make it to the live session? No worries! Simply register to receive the recording and catch up at your convenience. Also, feel free to share this invitation with any colleagues interested in this vital topic.
Vectra AI is the leader in Security AI-driven hybrid cloud threat detection and response. Only Vectra platform and services cover public cloud, SaaS applications, identity systems and network infrastructure – both on-premises and cloud-based. Organizations worldwide rely on the Vectra platform and services for resilience to ransomware, supply chain compromise, identity takeovers, and other cyberattacks impacting their organization.
For more information, visit vectra.ai
This competition is open to all threat hunters. This is a more advanced challenge, so experience with threat hunting and investigation will set you up for success!
The challenge will take approximately 10 hours to complete. You can log in at any time during the 4 weeks of the challenge and pick up right where you left off.
The objective is to collect as many points as possible. Points will accumulate on the Scoreboard.
This is a jeopardy-style format. The higher the points available – the harder the challenge. Some challenges unlock additional challenges to capture more points. Most challenges do offer hints, but hints will cost you points.
Yes! Invite your colleagues to join in on the fun. The challenge is open to threat hunters around the world and everyone has a chance to win.