This resource is no longer available

Cover Image

Hackers are efficient. Once they’ve compromised your environment, they establish persistence to lurk around coming and going as they please while they plot their next move.

Persistence has quickly become a staple in the modern attacker’s playbook. And while it gives attackers an ability to maintain access to compromised systems, it’s also an opportunity for detection.

Put on your hacker hats and watch this webinar to learn:

  • Where attackers are hiding in plain sight
  • Common techniques that adversaries and malware use to persist
  • How to detect (and eliminate) persistence mechanisms
  • The keys to a threat-informed defense
Vendor:
Huntress
Premiered:
Oct 4, 2021
Format:
Video
Type:
Webcast

This resource is no longer available.