Glitch effect

Cracks in the Shell: How Hackers Exploit the Perimeter to Gain Access

Glitch effectGlitch effect
Download Your
On-Demand Webinar
By submitting this form, you accept our Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Watch the
Webinar
By submitting this form, you accept our Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

“The perimeter is dead!” Security pros have said this for years because they’ve lost confidence in perimeter-based defenses. You can only automatically stop so many threats from getting into your environment, so you have to look for shady activity that might slip through that first line of defense.

The “death of the perimeter” is up for debate, but hackers keep exploiting vulnerabilities to gain access to your environment. Huntress sees attacks where the external perimeter is compromised all the time. In this session, you’ll see real-world attacks dissected by Huntress's elite SOC team, exposing how RDP, VPNs, and other entry points are compromised. 

You’ll learn:

  • How attackers can exploit RDP, VPNs, and more to gain access to your environment.
  • About real-world examples from front-line security experts who detected and responded to these attacks.
  • Simple configuration changes to reinforce your perimeter.

Cracks in the shell? Not after this session… ☠️

Glitch banner
Topics Covered
Attacker Tradecraft
Endpoint Detection and Response
Share
Generic Headshot Profile
Anton Ovrutsky
Principal Threat Hunting and Response Analyst
Linkedin icon
Generic Headshot Profile
Dray Agha
Principal Threat Hunting and Response Analyst
Linkedin icon

Cracks in the Shell: How Hackers Exploit the Perimeter to Gain Access

Glitch effectGlitch effect
Glitch banner
Topics Covered
Attacker Tradecraft
Endpoint Detection and Response
Share
Blurry glitch effect