- Präsentationen
- Dokumente
- Infografiken
Building a Cyber Threat Intelligence Knowledge Management System (Paris August 2019)
Vaticle
•
Vor 4 Jahren
Introduction to Web Application Security - Blackhoodie US 2018
Niranjanaa Ragupathy
•
Vor 5 Jahren
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat Security Conference
•
Vor 5 Jahren
BlueHat v18 || Killsuit the equation group's swiss army knife for persistence, evasion, and data exfil
BlueHat Security Conference
•
Vor 5 Jahren
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp and windows defender atp
BlueHat Security Conference
•
Vor 5 Jahren
OWASP AppSecEU 2018 – Attacking "Modern" Web Technologies
Frans Rosén
•
Vor 5 Jahren
CONFidence 2018: Who and why should fear hardware trojans? (Adam Kostrzewa)
PROIDEA
•
Vor 5 Jahren
CONFidence 2018: Everything’s Connected aka Threat Intelligence 102 (Marcin Siedlarz)
PROIDEA
•
Vor 5 Jahren
Malware Evasion Techniques
Thomas Roccia
•
Vor 6 Jahren
42 - Malware - Understand the Threat and How to Respond
Thomas Roccia
•
Vor 6 Jahren
Designing the Future: When Fact Meets Fiction
Dean Johnson
•
Vor 8 Jahren
The AI Rush
Jean-Baptiste Dumont
•
Vor 6 Jahren
Targeted attacks on major industry sectors in south korea 20171201 cha minseok_avar 2017 beijing_full version
Minseok(Jacky) Cha
•
Vor 6 Jahren
10(?) holiday gifts for the SOC who has everything
Ryan Kovar
•
Vor 6 Jahren
Adversarial Simulation Nickerson/Gates Wild West Hacking Fest Oct 2017
Chris Gates
•
Vor 6 Jahren
Three Considerations To Amplify Your Detection and Response Program
Morphick
•
Vor 7 Jahren
Examining Malware with Python
mrphilroth
•
Vor 8 Jahren
Threat Hunting
Splunk
•
Vor 6 Jahren