SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsIn this month’s SANS Threat Analysis Rundown, I focused on one of my favorite times of year in cybersecurity: annual report season.
In this month’s SANS Threat Analysis Rundown, I focused on one of my favorite times of year in cybersecurity: annual report season. Every spring, several major threat reports are released, each packed with valuable insights. I know reading hundreds of pages can be overwhelming, so during the stream, I pulled out key highlights and recurring themes from four major reports: the Verizon DBIR, Mandiant M-Trends, CrowdStrike’s Global Threat Report, and the Red Canary Threat Detection Report. I also shared how I personally use these reports to strengthen threat detection and intelligence practices. Here’s a quick recap of the discussion.
I started the livestream by explaining why annual threat reports are so valuable: they offer a concise overview of the threat landscape and help you focus on the most prevalent threats. No single report provides a complete picture, but when you compare multiple sources, clear patterns start to emerge.
I encouraged viewers to use these reports as a catalyst for action. If multiple sources highlight the same technique or issue, that’s a strong signal it should be a priority. While I couldn’t cover every report out there, you can find many more in this excellent GitHub repository that collects annual security reports.
The first report I covered was the Verizon Data Breach Investigations Report (DBIR). I always appreciate the DBIR’s broad, data-driven view based on thousands of real incidents contributed by a range of organizations. We kicked things off by discussing the lesser-known VERIS framework behind the report, which breaks down intrusions into structured data to help identify trends.
Key takeaways:
The DBIR underscores the ongoing importance of basic security hygiene. It might not be flashy, but enforcing multi-factor authentication (MFA), reducing credential reuse, and educating users about phishing still go a long way. Many organizations know what needs to be done — like patching and MFA — but struggle to consistently implement these basics.
Next, I walked through the Mandiant M-Trends report, which offers a different lens because it draws from more targeted, hands-on-keyboard intrusions.
Here’s what stood out:
What caught my attention:
This report reinforced the need to detect identity abuse and suspicious behavior in cloud environments, not just rely on traditional malware detection.
Lastly, I shared highlights from the Red Canary Threat Detection Report. (Full disclosure: I work at Red Canary, but I genuinely believe this report is a valuable community resource. I tried to keep my take as neutral as possible.)
Top findings:
One takeaway I emphasized: while it’s important to stay informed about novel threats, don’t neglect “old” but reliable techniques. Strong detections for credential abuse, suspicious command-line activity, and identity anomalies can significantly boost your defensive capabilities.
While reading these reports cover-to-cover is worthwhile, if you’re short on time, I hope this summary helped. These reports draw from different datasets but share common insights that can guide your threat detection and intelligence strategies. They’re also great resources for educating leadership and building support for a stronger security program.
Thanks again to everyone who joined live or caught the replay. I’ll be back next month with another STAR Livestream to share more threat intel and detection ideas to help us all stay ahead of evolving threats. Hope to see you then!
Katie is the Director of Intelligence at Red Canary, a Nonresident Senior Fellow at the Atlantic Council, and is a Cyberjutsu Girls Academy (CGA) program manager.
Read more about Katie Nickels