Hunt APT, state threat actors, their malware tools & exploits, by searching Splunk event logs It is a must-have app, which hunts for presence of advanced persistent threats (APTs), threat actors, state-sponsored attackers, malware, and exploits in your organization's assets. All detected malware, exploits, and threat actors are mapped to the MITRE ATT&CK framework, providing deep insight into potential risks. Cyber Security Essentials identifies a wide range of malware tools used by threat actors, including: 1. Backdoor. 2. Worms. 3. Ransomware. 4. Bots. 5. Trojan horses. 6. Keyloggers. 7. Rootkits. 8. Spyware. 9. Fileless malware. 10. Cryptojacking. 11. Wiper malware. 12. Adware. 14. Viruses 15. P2P-Worm 16. Internet Worms 17. Net-worm 18. Clickjacking 19. Cryptominer 20. Fileless malware You can easily configure the scan interval in the app’s settings. The real-time scan feature continuously monitors for threats in near real-time, as allowed by Splunk. Information Use: Your email address is used to improve detection logic based on your feedback. Additionally, we may notify you about app upgrades, updates, or changes to features, user agreements, or the privacy policy.
(0)
Categories
Created By
Type
Downloads
Licensing
Splunk Answers
Resources