Episode 53: Threat Actors Use of Cobalt Strike & How Attacker Actions Can Inform Defenses

Digital Shadows

The dynamic duo of Dr Gold and Simon Hall join Michael Marriott to discuss our recent findings on threat actors using cracked versions of Cobalt Strike conduct attacks, and how defenders can use this to inform their defense. Read the blog to learn more: https://www.digitalshadows.com/blog-and-research/threat-actors-use-of-cobalt-strike-why-defense-is-offenses-child/. Building on this theme, in part two, Richard Gold outlines the benefits of mapping the Mitre ATT&CK framework to the ASD Essential 8. You can read Richard’s blog here: https://www.digitalshadows.com/blog-and-research/mapping-the-asd-essential-8-to-the-mitre-attck-framework/.


Listen on iTunes: https://itunes.apple.com/us/podcast/episode-53-threat-actors-use-cobalt-strike-how-attacker/id1326304686?i=1000424885530&mt=2

Listen on Soundcloud: https://soundcloud.com/digitalshadows/episode-53-threat-actors-use-of-cobalt-strike-how-attacker-actions-can-inform-defenses

Previous Post
Episode 54: Marriott Breach And 2019 Trends
Episode 54: Marriott Breach And 2019 Trends

Rick Holland and Harrison Van Riper join Michael Marriott to discuss the implications of the Marriott data ...

Next Post
Episode 52: Black Friday and Cybercrime
Episode 52: Black Friday and Cybercrime

For this special mid-week edition of ShadowTalk, Harrison Van Riper, Jamie Collier, and Rafael Amado focus ...


Threat Intel Fan?

Sign up below to get our TI updates delivered to your inbox!

First Name
Last Name
State- optional
Job Title
Thank you!
Error - something went wrong!