1、Unveiling Dark Pink:An In-Depth Analysis of APACs Covert APT ThreatOUTLINEDark Pinks latest campaignTelegram Exfiltration and C2 demoTeleScoutDark Pinks TTPsI GOT AN EMAIL!(Group-IB,2023)ISO FILEISO 。
2、2022 Mandiant2024 MandiantSecuring todays secrets against tomorrows threatsThe quantum-cryptographic threat landscape19 March 2024Stephen BegleyPrincipal Consultant at Mandiant ConsultingIntroduction。
3、Once a victim,always a victimA dive into the ecosystem of Cyber Extortion(Cy-X)and the increasing desperation of itsparticipantsDiana Selck-Paulsson&Simone KrausLead Security ResearcherSenior CSI。
4、Beg,Borrow or StealTom McElroy&Anders NielsenMicrosoft Threat IntelligenceMicrosoft Threat IntelligenceMicrosoft Threat Intelligence Center(MSTIC)Protect Microsoft&our customersNation State&a。
5、Memory Safe Languages Wont Save YouYarden ShafirAbout me Security Engineer&Researcher Windows Internals researcher Former EDR developer Likes to research exploits,mitigations and post-exploitatio。
6、TA577 Walked Just Past YouIndirect Syscalls in PikabotPatrick StaubmannTeam Lead Threat AnalysisVMRay GmbH2Pikabot OverviewFirst SeenClassificationThreat ActorEvasion TechniquesEarly 2023(Down-)Loade。
7、From Recon to Ruin:Exposing the Iranian Agrius APT Latest TTPsOr ChechikDaniel FrankAbout Us Or ChechikPrincipal Security Researcher,Cortex XDR,Palo Alto NetworksDaniel FrankThreat Research Team Lead。
8、Camouflage and ChaosDr.Aleksandar Milenkoski(SentinelLabs,SentinelOne)Julian-Ferdinand Vgele(Insikt Group,Recorded Future)On the Trail of Chinese APTs Playing the Ransomware GameAgendaWhy Would APTs 。
9、Tracing Mobile Chinese Surveillance Operations fromAcquisition to AttributionKristina BalaamAlemdar Islamoglu Lookout,Inc.|Confidential and Proprietary2Who We AreAlemdar IslamogluSenior Staff Securit。
10、Well knock your SOCKS offInsights into a million-dollar residential proxy service whoamiHanno HeinrichsMission Lead:OJoel SnapeSenior R“Were good with computers”Subtitle HereLorem ipsum dolor sit ame。
11、When Cybercriminals Goof:OPSEC Oopsies and Epic Falls Will Thomas FOR589 Co-author and Instructor,SANS Institute CTI Researcher&Threat Hunter,Equinix Co-founder,Curated Intelligence$whoami Spent 。
12、 Volexity Inc.|Proprietary&ConfidentialIt Has Been 0 Days Since the Last Edge-Device Security Incident1Tom LancasterCyberThreat|December 2024TLP:WHITE Volexity Inc.|Proprietary&ConfidentialWh。
13、/Secureworks/Confidential-Limited External DistributionEmbracing the Power of Threat Intelligence:A Game-Changer in CybersecurityRebecca Taylor,Threat Intelligence Knowledge Manager&Human Intelli。
14、APT41 Has Risen from the DUST SANS Cyber Threat 2024Chris Eastwood,MandiantSebastian Demmer,MandiantProprietary&ConfidentialProprietary&ConfidentialMandiantGoogle CloudContents01Introductions。
15、Russian Gamaredon APT GroupMobile Surveillance Tools2Kyle Schmittle-CISSP,CCSPSenior Security Intelligence Researcher Threat Research Team Lookout15+years in Threat Intelligence3AgendaBackgroundLooko。