Understanding Common Hacking Techniques and Forensic Analysis

For lawyers working with forensic teams after a breach, there can be a lot of jargon to decipher. A recent Morrison & Foerster program shed light on some of those terms, explaining common hacking techniques and forensic investigatory tools. The program, featuring Wendi Whitmore and Brock Bell of Unit 42, Palo Alto Networks, and Alex Iftimie, a partner at Morrison & Foerster, explored the most common current attack vectors; how attackers escalate privileges and move laterally within an environment; how to identify data access and exfiltration; and the steps involved in forensic investigations and their limitations. See “Identifying and Preventing Ransomware Attacks” (Sep. 23, 2020); and “Preparing for and Responding to Ransomware Attacks” (Feb. 19, 2020).

To read the full article

Continue reading your article with a CSLR subscription.