Avid learner. Passionate about all things Malware, Threat Hunting and in love with Windows Internals
With malware like “emotet” claiming more than 2$ billion dollars in damages and the recent supply chain attack that hit “solar winds” infecting more than 30 companies, 13 of which are government agencies. It becomes clearer than ever that security is a key component of any technologies based infrastructure.
Understanding how these threat actors and malware authors operate is key to prevent the next attack from being successful.
In this session, I’ll talk about some of the tools and techniques that are currently being used by malware authors and threat actors to perform their attacks and how can we as security teams detect and hopefully prevent them from happening.
Language: English
Talk