Malware Automation: Techniques and Advantages - BSidesLV 2013
Offered By: YouTube
Course Description
Overview
Explore malware automation techniques and their impact on cybersecurity in this BSidesLV 2013 conference talk. Delve into the current state of malware development, from lone wolf attackers to armies of armored malware. Examine the attacker's arsenal, including DIY kits, armoring tools, and AV scanners. Learn about the process of malware automation, its advantages, and the exponential effect it has on threat proliferation. Discover how easy malware updates and AV evasion techniques are changing the landscape of cyber threats. Gain insights from Christopher Elisan, an expert from RSA FIRSTWATCH, as he discusses the purpose and implications of malware automation in the evolving world of cybersecurity.
Syllabus
Intro
WHO AM I?
RSA FIRSTWATCH
PURPOSE OF THE TALK
AGENDA
CURRENT STATE...
LONE WOLF
ARMY OF ARMORED MALWARE
THE ATTACKER'S ARSENAL
DIY KITS
ARMORING TOOLS
AV SCANNERS
THE PROCESS
ADVANTAGES
EXPONENTIAL EFFECT
EASY MALWARE UPDATE
KNOCK AV OUT
PUTTING THEM TOGETHER
Related Courses
Build Undetectable Malware Using C Language: Ethical HackingUdemy Máster en Hacking con Python - Vuélvase un Hacker Ético
Udemy Practical Techniques for AV Bypass
YouTube Cyberespionage - Targeted Attacks Abusing Third-Party Cloud Services
RSA Conference via YouTube PIC Your Malware
BruCON Security Conference via YouTube