Glitch effect

Cracks in the Shell: How Hackers Exploit the Perimeter to Gain Access

Glitch effectGlitch effect
Watch the Webinar
By submitting this form, you accept our Terms of Service & Privacy Policy
Oops! Something went wrong while submitting the form.

“The perimeter is dead!” Security pros have said this for years because they’ve lost confidence in perimeter-based defenses. You can only automatically stop so many threats from getting into your environment, so you have to look for shady activity that might slip through that first line of defense.

The “death of the perimeter” is up for debate, but hackers keep exploiting vulnerabilities to gain access to your environment. Huntress sees attacks where the external perimeter is compromised all the time. In this session, you’ll see real-world attacks dissected by Huntress's elite SOC team, exposing how RDP, VPNs, and other entry points are compromised. 

You’ll learn:

  • How attackers can exploit RDP, VPNs, and more to gain access to your environment.
  • About real-world examples from front-line security experts who detected and responded to these attacks.
  • Simple configuration changes to reinforce your perimeter.

Cracks in the shell? Not after this session… ☠️

Anton Ovrutsky
Principal Threat Hunting and Response Analyst
Linkedin icon
Dray Agha
Senior Manager, Security Operations Center
Linkedin icon