MENU

Fun & Interesting

Using Metadata to Hunt for IoCs

Vectra AI 84 lượt xem 1 month ago
Video Not Working? Fix It Now

Join Tiffany Nip (Product Marketing Manager, Vectra AI) and Julian Kraus (Security Engineer, Vectra AI) as they explore how to use metadata for IOC (Indicator of Compromise) hunting. Learn how to proactively search for suspicious domains, risky behaviors, and exposure to known vulnerabilities using Vectra AI’s platform.

👉 Start your self-guided Vectra AI Platform tour: https://www.vectra.ai/tours

00:00 - Introduction
01:39 - What is IOC hunting and why it matters
05:00 - Real-world example: WS_FTP server vulnerability hunting
07:04 - Checking exposure to ESXi vulnerabilities
11:28 - Live Demo: Detecting suspicious executable downloads
14:13 - Advanced SQL search
15:07 - More Threat hunting use cases to stay ahead of attackers

-- About Vectra AI --
Vectra AI, Inc. is the cybersecurity AI company that protects modern networks from modern attacks. When modern cyber attackers bypass existing controls, evade detection and gain access to customers’ data center, campus, remote work, identity, cloud, and IoT/OT environments, the Vectra AI Platform sees their every move, connects the dots in real-time, and stops them from becoming breaches. With 35 patents in AI security and the most vendor references in MITRE D3FEND, organizations worldwide rely on Vectra AI to see and stop attacks their other tools can’t. For more information, visit www.vectra.ai.

Comment