Shadowhunt Intel
The Perimeter Is Under Siege
Inside You’ll Find
An analysis of 500,000+ attacks on our perimeter-facing decoys following the COVID-19 outbreak. We look at:
- What were the top Internet-facing assets targeted by adversaries? Where did these attacks originate from?
- What were the various tactics that attackers used to stay under the radar and avoid detection in a work from home world?
- What were the different TTPs and open source/community tools that hackers used to execute attacks?
- Strategic and tactical recommendations from our threat hunting team that you can implement to mitigate perimeter threats.