Watch a 41-minute conference talk from x33fcon exploring how threat actors are shifting their attack strategies to edge devices and learn effective defensive measures. Dive into the evolving landscape of cybersecurity where adversaries are adapting to enhanced EDR solutions by targeting less monitored assets like routers, firewalls, and virtual machine hypervisors. Examine real-world cases of edge device compromises, understand the unique challenges these attacks present for forensic analysis and detection, and discover practical strategies for both blue and red teams. Learn how to implement comprehensive threat hunting and intelligence gathering techniques to reduce dwell time and enable early detection of campaigns targeting edge devices. Master the complex approach to defending against these tactics while gaining insights into how to incorporate these methods into adversarial activity emulation.
Overview
Syllabus
4. Kamil Bojarski : Blank Space - Addresing Tactics Related To Compromise Of Edge Devices
Taught by
x33fcon