Once an attacker is inside your network and has access to your data they face one major challenge, data exfiltration. Malicious actors are more and more frequently turning to built-in resources to achieve data exfiltration. This eBook will demonstrate just how easy it is for attackers to utilise this tactic and show defenders the best methods for detection and remediation.
As well as:
- A tactic demonstration on data exfiltration using built-in resources
- Live and audit detection
- Remediation and prevention remedies