An Analysis of Attacker Activity through NDR, EDR, and NGFW Data

Cover Image

The proliferation of AI has lowered the barrier for attackers, expanding the threat landscape. This white paper analyzes attacker activity using data from network detection and response (NDR), endpoint detection and response (EDR), and next-generation firewall (NGFW) solutions.

The report examines common MITRE ATT&CK tactics and techniques in 2023, including command and control (C2) methods, remote access trojans, credential abuse, and PowerShell-based malicious activity. It also presents a case study on the Rhysida ransomware group, detailing their tactics and providing recommendations for combating ransomware.

Use these insights to improve threat detection and response.

Vendor:
Fortinet, Inc.
Posted:
Oct 7, 2024
Published:
Oct 8, 2024
Format:
PDF
Type:
Research Content
Already a Bitpipe member? Log in here

Download this Research Content!