October 19, 2019
The Zero2Hero malware course continues with Daniel Bunce covering how three actors gain an initial foothold using either droppers or downloaders, why the initial stage matters, and the methods of gaining initial access by looking at the loader used for Hancitor and ISFB. We’re also going to be looking at recognizing tactics, techniques and procedures in the initial stages used by ISFB and looking at how we can assign them to different groups operating this malware.
Access the entire course for free (before end of December)
SentinelOne PartnerOne - America's 2025
⛳️ Last week in Pebble Beach the America's best cybersecurity partners came together for our annual PartnerOne summit. Check out…
Just a Sec: Cybersecurity Unfiltered—Fast, Frank, and From the Front Lines
Welcome to the first-ever Just A Sec, a no-holds-barred, quick-fire monthly livestream. It’s cybersecurity like you’ve never heard it before—unfiltered,…
See how our intelligent, autonomous cybersecurity platform harnesses the power of data and AI to protect your organization now and into the future.