Abstract illustration

True Stories From the Threat Hunting Files

Threat actors use domains and IP addresses to launch and support various kinds of criminal activity, from phishing to hacking to espionage. As a network defender, your ability to map and characterize this infrastructure is of critical importance in building defenses against targeted attacks. Join DomainTools Senior Security Researcher Kyle Wilhoit and Director of Product Management Tim Helming on a “virtual ride-along” using DomainTools Iris to quickly and efficiently expose threat actor infrastructure, using real-world cases as examples.

This webinar covers:

  • How to protect yourself against various criminal activity (i.e. phishing, hacking, espionage etc.)
  • Examples of investigations and threat hunting maneuvers from the trenches
  • How to quickly and efficiently expose threat actor infrastructure