8 hours 39 minutes
hello and welcome to another application of the minor attack framework discussion. Today we're going to get into the ex filtration phase of the minor attack framework. So what is ex filtration? While ex filtration is when a threat actor is trying to steal information or data,
it can consist of techniques that include things such as compression and encryption
to attempt to avoid protections and detection while those activities air taking place. Now, with respect to what we will specifically be reviewing, we're going to focus on automated ex filtration data compression or compressed and data transfer limits.
So with that in mind, I want to thank you for your time today. And I look forward to seeing you again.