← All talks

Post-Exploitation Attacks: Detect The Undetectable! #shorts

BSides Frankfurt0:201.0K viewsPublished 2026-03Watch on YouTube ↗
About this talk
Discover the low-effort, high-return tactics attackers use after breaching systems. Shockingly, most organizations can't detect these actions. #Cybersecurity #Attackers #PostExploitation #Infosec #ThreatDetection
Show transcript [en]

Does anybody have want to throw a guess like what are some other things that attackers do post exploitation? Very low effort, very high return on investment in your organization. And the vast majority of organizations do not have the ability to successfully detect these types of attacks which is ridiculous. Uh,