Malware Mitigation Sample Detonation Intelligence Automation - Make Your Binaries Work
Offered By: YouTube
Course Description
Overview
Syllabus
Intro
THE RISE OF THE MACHINES.
AND MALWARE WORKFLOWS
A MACHINE LEARNING ALGORITHM WALKS INTO A BAR...
AND THE MACHINE LEARNING ALGORITHM SAYS...
HINDERING US A LITTLE AS INCIDENT RESPONDERS?
MACHINE LEARNING OUTPUT
PROBLEM STATEMENT
More and more security technologies are relying on machine learning for file conviction Greatly improves efficacy and elasticity of detection and prevention mechanisms Makes identifying exactly what is attacking you slightly more difficult Is heavily reliant on static analysis
MALWARE WORKFLOW WE WANT
HYBRID ANALYSIS
Static analysis Dynamic analysis Static analysis of dynamic data sets Threat intel correlation
OPPORTUNISTIC PRICE DISCRIMINATION!
MALWARE ALERT IN FALCON
CODE OVERLAP WITH DRIDEX - ATTRIBUTION
BERSERK BEAR HAS BEEN TARGETING ENGINEERING AND INDUSTRIAL CONTROL COMPANIES.
USED IN THESE OPERATIONS TO REGAIN CONTROL IN THE EVENT PRIMARY METHODS (STOLEN CREDENTIALS) ARE COMPROMISED.
BORING!
SEE YOU MONDAY!
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network