How to Use Canary Tokens for Threat Hunting

  Рет қаралды 24,038

The CISO Perspective

The CISO Perspective

Күн бұрын

Пікірлер: 14
@redteamalerts1274
@redteamalerts1274 4 жыл бұрын
Fantastic.. Thank you!
@flataquabat4154
@flataquabat4154 3 жыл бұрын
really interesting tool I didn’t know of! Great video!
@amoltofi1
@amoltofi1 3 жыл бұрын
Can we discuss technology??
@Alk3fan22
@Alk3fan22 4 жыл бұрын
We got sent one of these devices on a trial. Never dealt with a Cybersecurity company out of South Africa before lol. We loved the device! But wayyyy too expensive for SMB market. The free tokens are pretty awesome tho!
@ahmednader6687
@ahmednader6687 8 ай бұрын
Amazing!
@regyelstiven6998
@regyelstiven6998 2 жыл бұрын
A friend of mine sent me a link and from that moment on he keeps telling me that he knows where I live, I would like to know if there is a way to make me stop knowing my IP
@Thanasisapost
@Thanasisapost 4 ай бұрын
I got sent a canary token on discord i opened it i dont know what to do do am i at risked of my privacy being violated?
@MohamedABangura-og5zo
@MohamedABangura-og5zo 5 ай бұрын
If I use my accounts what next do I do to the last option
@DittoRaju
@DittoRaju 4 жыл бұрын
How canary token differernt from canary thinkst ? Can you explain
@pandasan256
@pandasan256 2 жыл бұрын
wouldn't the attacker scan the file for tokens before opening them?
@SoulJah876
@SoulJah876 2 жыл бұрын
If this canarytoken is opened in a sandbox with no internet access, I assume that this fails.
@bala007raju
@bala007raju 3 жыл бұрын
Thanks lot
@KrisRosson
@KrisRosson 4 жыл бұрын
Would this work if the files were encrypted? If so, I could see that this could help against Ransomware with the webhook functionality with an EDR tool to isolate the endpoint automatically.
@hapslab
@hapslab Жыл бұрын
Please re-train the model for correct auto-generated Transcript. Its in Korean & its wrong!
What is Secure Access Service Edge (SASE) ?
7:50
The CISO Perspective
Рет қаралды 129 М.
ATT&CK Matrix: The Enemies Playbook
14:04
The CISO Perspective
Рет қаралды 51 М.
World’s strongest WOMAN vs regular GIRLS
00:56
A4
Рет қаралды 39 МЛН
Увеличили моцареллу для @Lorenzo.bagnati
00:48
Кушать Хочу
Рет қаралды 7 МЛН
How to Catch A Hacker In Your Computer
17:05
ThioJoe
Рет қаралды 274 М.
Track a Target Using Canary Token Tracking Links [Tutorial]
16:02
DRM explained - How Netflix prevents you from downloading videos?
18:17
Mehul - Codedamn
Рет қаралды 215 М.
How the Best Hackers Learn Their Craft
42:46
RSA Conference
Рет қаралды 2,6 МЛН
7 Cybersecurity Tips NOBODY Tells You (but are EASY to do)
13:49
All Things Secured
Рет қаралды 794 М.
How to know if your PC is hacked? Suspicious Network Activity 101
10:19
The PC Security Channel
Рет қаралды 1,3 МЛН
NextGen Firewall & IPS Evasion: 5 Defensive Techniques
11:38
The CISO Perspective
Рет қаралды 7 М.
Flipper Zero: Hottest Hacking Device?
10:01
David Bombal
Рет қаралды 7 МЛН
Breaking The Kill Chain: A Defensive Approach
13:18
The CISO Perspective
Рет қаралды 165 М.