The Work of Cyber in the Age of Mechanical Reproduction
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore the systematic approach of advanced threat actors in developing and deploying high-end malware operations in this 26-minute conference talk from the Hack In The Box Security Conference. Delve into the methods used by apex predators in the cybersecurity landscape to scale their operations while maintaining effectiveness. Examine how these actors productionize exemplary operations, utilizing layers of abstraction to accommodate numerous targets and simplify processes for future operators. Gain insights into the relationships between campaigns, malware families, and threat actors through the lens of malware paleontology. Discover a previously undisclosed missing link that sheds light on threat actor collaboration. Learn from Juan Andrés, a seasoned security researcher and adjunct professor, as he shares his expertise on tracking cyberespionage groups and analyzing their sophisticated techniques.
Syllabus
#HITBCyberWeek #CommSec D1 - The Work of Cyber in the Age of Mechanical Reproduction
Taught by
Hack In The Box Security Conference
Related Courses
Build Undetectable Malware Using C Language: Ethical HackingUdemy Máster en Hacking con Python - Vuélvase un Hacker Ético
Udemy Practical Techniques for AV Bypass
YouTube Cyberespionage - Targeted Attacks Abusing Third-Party Cloud Services
RSA Conference via YouTube PIC Your Malware
BruCON Security Conference via YouTube