The Hunt for Major League IoT-ICS Threats - A Deep Dive into IoT Threat Terrain
Offered By: Black Hat via YouTube
Course Description
Overview
Dive into a comprehensive 31-minute conference talk from Black Hat exploring the critical landscape of IoT and ICS security threats. Discover the importance of automated threat hunting in a world where hundreds of millions of devices are vulnerable to malicious attacks. Learn about advanced hunting techniques, including malware crawlers, session crawlers, and threat intelligence systems. Explore the process of generating IoCs for blocklists, analyzing global botnets, and identifying unknown malware. Gain insights into 1-day and unknown vulnerability hunting, as well as attack trend analysis for early warning systems. Presented by Mars Cheng and Patrick Kuo, this talk provides a deep understanding of the evolving threat terrain in the Internet of Things and Industrial Control Systems.
Syllabus
Intro
black hat
Why Perform Automated Threat Hunting?
350+ Hunting Engines in the World
The Hunting Agent
Malware Crawler and Session Crawler
Generate loC to Block List
Malware Analyzer
Threat Intelligence based on Athena
Global Botnet Analysis and Alert
Unknown Malware Playground
1-Day/Unknown Vulnerability Hunting
Attack Trend Analysis as an Early Warning System
The Threat of Next Generation
Taught by
Black Hat
Related Courses
Malicious Software and its Underground Economy: Two Sides to Every StoryUniversity of London International Programmes via Coursera Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax Android Malware Analysis - From Zero to Hero
Udemy How to Create and Embed Malware (2-in-1 Course)
Udemy