Completed
MALWARE WORKFLOW WE WANT
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Malware Mitigation Sample Detonation Intelligence Automation - Make Your Binaries Work
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 THE RISE OF THE MACHINES.
- 3 AND MALWARE WORKFLOWS
- 4 A MACHINE LEARNING ALGORITHM WALKS INTO A BAR...
- 5 AND THE MACHINE LEARNING ALGORITHM SAYS...
- 6 HINDERING US A LITTLE AS INCIDENT RESPONDERS?
- 7 MACHINE LEARNING OUTPUT
- 8 PROBLEM STATEMENT
- 9 More and more security technologies are relying on machine learning for file conviction Greatly improves efficacy and elasticity of detection and prevention mechanisms Makes identifying exactly what …
- 10 MALWARE WORKFLOW WE WANT
- 11 HYBRID ANALYSIS
- 12 Static analysis Dynamic analysis Static analysis of dynamic data sets Threat intel correlation
- 13 OPPORTUNISTIC PRICE DISCRIMINATION!
- 14 MALWARE ALERT IN FALCON
- 15 CODE OVERLAP WITH DRIDEX - ATTRIBUTION
- 16 BERSERK BEAR HAS BEEN TARGETING ENGINEERING AND INDUSTRIAL CONTROL COMPANIES.
- 17 USED IN THESE OPERATIONS TO REGAIN CONTROL IN THE EVENT PRIMARY METHODS (STOLEN CREDENTIALS) ARE COMPROMISED.
- 18 BORING!
- 19 SEE YOU MONDAY!