2024年SANS網絡威脅會議(Cyber Threat Summit 2024)嘉賓演講PPT合集(共15套打包)

2024年SANS網絡威脅會議(Cyber Threat Summit 2024)嘉賓演講PPT合集(共15套打包)

更新時間:2024-12-23 報告數量:15份

報告合集目錄

報告預覽

  • 全部
    • 2024年SANS網絡威脅會議(Cyber Threat Summit 2024)嘉賓演講PPT合集
      • 揭開Dark Pink的面紗——對APAC隱蔽的APT威脅的深入分析.pdf
      • STEPHEN BEGLEY - 保護今天的秘密免受明天的威脅.pdf
      • 一次受害永遠受害:深入探究網絡勒索(Cy-X)生態系統及其參與者的日益絕望.pdf
      • Tom McElroy and Anders Nielsen - 乞討、借用或偷竊.pdf
      • Keynote記憶安全語言救不了你.pdf
      • Patrick Staubmann - TA577從你身邊走過 - Pikabot中的間接系統調用.pdf
      • Or Chechik and Daniel Frank - 從偵察到毀滅——揭露伊朗 Agrius APT 最新 TTPs.pdf
      • Aleksandar Milenkoski and Julian-偽裝與混亂——中國APTs玩勒索游戲的軌跡.pdf
      • Alemdar Islamoglu - 從獲取到歸因追蹤中國移動監控行動.pdf
      • 揭秘價值百萬美元的住宅代理服務.pdf
      • 當網絡犯罪分子犯錯時 - OPSEC Oopsies 和 Epic Falls.pdf
      • Tom Lancaster - 自上次邊緣設備安全事件以來已經是零日Zero Days.pdf
      • Rebecca Taylor - 擁抱威脅情報的力量——網絡安全的游戲規則改變者.pdf
      • APT41已從塵埃中崛起.pdf
      • Kyle Schmittle-俄羅斯Gamaredon APT 集團-移動監控工具.pdf
請點擊導航文件預覽
資源包簡介:

1、Unveiling Dark Pink:An In-Depth Analysis of APACs Covert APT ThreatOUTLINEDark Pinks latest campaignTelegram Exfiltration and C2 demoTeleScoutDark Pinks TTPsI GOT AN EMAIL!(Group-IB,2023)ISO FILEISO 。

2、2022 Mandiant2024 MandiantSecuring todays secrets against tomorrows threatsThe quantum-cryptographic threat landscape19 March 2024Stephen BegleyPrincipal Consultant at Mandiant ConsultingIntroduction。

3、Once a victim,always a victimA dive into the ecosystem of Cyber Extortion(Cy-X)and the increasing desperation of itsparticipantsDiana Selck-Paulsson&Simone KrausLead Security ResearcherSenior CSI。

4、Beg,Borrow or StealTom McElroy&Anders NielsenMicrosoft Threat IntelligenceMicrosoft Threat IntelligenceMicrosoft Threat Intelligence Center(MSTIC)Protect Microsoft&our customersNation State&a。

5、Memory Safe Languages Wont Save YouYarden ShafirAbout me Security Engineer&Researcher Windows Internals researcher Former EDR developer Likes to research exploits,mitigations and post-exploitatio。

6、TA577 Walked Just Past YouIndirect Syscalls in PikabotPatrick StaubmannTeam Lead Threat AnalysisVMRay GmbH2Pikabot OverviewFirst SeenClassificationThreat ActorEvasion TechniquesEarly 2023(Down-)Loade。

7、From Recon to Ruin:Exposing the Iranian Agrius APT Latest TTPsOr ChechikDaniel FrankAbout Us Or ChechikPrincipal Security Researcher,Cortex XDR,Palo Alto NetworksDaniel FrankThreat Research Team Lead。

8、Camouflage and ChaosDr.Aleksandar Milenkoski(SentinelLabs,SentinelOne)Julian-Ferdinand Vgele(Insikt Group,Recorded Future)On the Trail of Chinese APTs Playing the Ransomware GameAgendaWhy Would APTs 。

9、Tracing Mobile Chinese Surveillance Operations fromAcquisition to AttributionKristina BalaamAlemdar Islamoglu Lookout,Inc.|Confidential and Proprietary2Who We AreAlemdar IslamogluSenior Staff Securit。

10、Well knock your SOCKS offInsights into a million-dollar residential proxy service whoamiHanno HeinrichsMission Lead:OJoel SnapeSenior R“Were good with computers”Subtitle HereLorem ipsum dolor sit ame。

11、When Cybercriminals Goof:OPSEC Oopsies and Epic Falls Will Thomas FOR589 Co-author and Instructor,SANS Institute CTI Researcher&Threat Hunter,Equinix Co-founder,Curated Intelligence$whoami Spent 。

12、 Volexity Inc.|Proprietary&ConfidentialIt Has Been 0 Days Since the Last Edge-Device Security Incident1Tom LancasterCyberThreat|December 2024TLP:WHITE Volexity Inc.|Proprietary&ConfidentialWh。

13、/Secureworks/Confidential-Limited External DistributionEmbracing the Power of Threat Intelligence:A Game-Changer in CybersecurityRebecca Taylor,Threat Intelligence Knowledge Manager&Human Intelli。

14、APT41 Has Risen from the DUST SANS Cyber Threat 2024Chris Eastwood,MandiantSebastian Demmer,MandiantProprietary&ConfidentialProprietary&ConfidentialMandiantGoogle CloudContents01Introductions。

15、Russian Gamaredon APT GroupMobile Surveillance Tools2Kyle Schmittle-CISSP,CCSPSenior Security Intelligence Researcher Threat Research Team Lookout15+years in Threat Intelligence3AgendaBackgroundLooko。

展開閱讀全文
客服
商務合作
小程序
服務號
折疊
午夜网日韩中文字幕,日韩Av中文字幕久久,亚洲中文字幕在线一区二区,最新中文字幕在线视频网站