TC-KU-HYAS-webinar2.hunt-for-phish.17feb2021

Watch practitioners from ThreatConnect, King & Union, and HYAS demonstrate an investigation and share best practices as they weave together their tools to locate adversary infrastructure.  Starting from a single phishing email, the team explains the process of identifying other indicators of compromise (IOCs) along with adjacent adversary infrastructure that can be blocked. 

Request a Demo