Go To Home
Shadowhunt Intel

The Perimeter Is Under Siege

Perimeter is under siege

Inside You’ll Find

An analysis of 500,000+ attacks on our perimeter-facing decoys following the COVID-19 outbreak. We look at:

  • What were the top Internet-facing assets targeted by adversaries? Where did these attacks originate from?
  • What were the various tactics that attackers used to stay under the radar and avoid detection in a work from home world?
  • What were the different TTPs and open source/community tools that hackers used to execute attacks?
  • Strategic and tactical recommendations from our threat hunting team that you can implement to mitigate perimeter threats.

Grab Your Copy

Go to home

Simple solutions for detecting and containing threats. Working with us does not break the bank or your spirit. We’re the company of choice for offensive security teams with a Net Promoter Score of 70+.

© 2015-2021 Smokescreen. All rights reserved.

Solutions For
Web Application AttacksLateral MovementRansomware AttacksTargeted ThreatsSocial EngineeringMalware-less Attacks