Email Detection Engineering + Threat Hunting

location icon

calendar icon

-

at

event link icon

Visit Event Website »

Sign up now for upcoming workshops, we'll let you know once it's scheduled.

Email-based attacks are constantly evolving. Historically, black-box vendor solutions have only offered limited scope and tooling to swiftly respond to emerging threats.

Gain hands-on detection engineering experience in a lab environment led by the Sublime team. In this workshop, you will:

  • Get insights into the latest techniques used to deliver malware strains like IcedID and Emotet
  • Hunt through email data to identify malicious activity and develop rules to detect and block attacks
  • Leave with a strong understanding of tools and techniques to defend your organization from email threats
  • Create rules using free and open detection engines, like Sublime and YARA, while dissecting faithfully reproduced malware in delivr.to's payload collection

We'll cover common phishing techniques including:

  • QR Code phishing
  • Callback phishing
  • Credential phishing
  • VIP Impersonations
  • HTML smuggling via links/attachments
  • OneNote / LNK file, IcedID, and Emotet malware strains
back to events icon
Back to Events

Email Detection Engineering + Threat Hunting

location icon

calendar icon

-

at

event link icon

Visit Event Website »

Sign up now for upcoming workshops, we'll let you know once it's scheduled.

Email-based attacks are constantly evolving. Historically, black-box vendor solutions have only offered limited scope and tooling to swiftly respond to emerging threats.

Gain hands-on detection engineering experience in a lab environment led by the Sublime team. In this workshop, you will:

  • Get insights into the latest techniques used to deliver malware strains like IcedID and Emotet
  • Hunt through email data to identify malicious activity and develop rules to detect and block attacks
  • Leave with a strong understanding of tools and techniques to defend your organization from email threats
  • Create rules using free and open detection engines, like Sublime and YARA, while dissecting faithfully reproduced malware in delivr.to's payload collection

We'll cover common phishing techniques including:

  • QR Code phishing
  • Callback phishing
  • Credential phishing
  • VIP Impersonations
  • HTML smuggling via links/attachments
  • OneNote / LNK file, IcedID, and Emotet malware strains
back to events icon
Back to Events

Register Now

Thanks for your interest! Due to limited space, you’ll receive a confirmation email once your registration is approved.
Oops! Something went wrong while submitting the form.