Completed
USED IN THESE OPERATIONS TO REGAIN CONTROL IN THE EVENT PRIMARY METHODS (STOLEN CREDENTIALS) ARE COMPROMISED.
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Malware Mitigation Sample Detonation Intelligence Automation - Make Your Binaries Work
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 THE RISE OF THE MACHINES.
- 3 AND MALWARE WORKFLOWS
- 4 A MACHINE LEARNING ALGORITHM WALKS INTO A BAR...
- 5 AND THE MACHINE LEARNING ALGORITHM SAYS...
- 6 HINDERING US A LITTLE AS INCIDENT RESPONDERS?
- 7 MACHINE LEARNING OUTPUT
- 8 PROBLEM STATEMENT
- 9 More and more security technologies are relying on machine learning for file conviction Greatly improves efficacy and elasticity of detection and prevention mechanisms Makes identifying exactly what …
- 10 MALWARE WORKFLOW WE WANT
- 11 HYBRID ANALYSIS
- 12 Static analysis Dynamic analysis Static analysis of dynamic data sets Threat intel correlation
- 13 OPPORTUNISTIC PRICE DISCRIMINATION!
- 14 MALWARE ALERT IN FALCON
- 15 CODE OVERLAP WITH DRIDEX - ATTRIBUTION
- 16 BERSERK BEAR HAS BEEN TARGETING ENGINEERING AND INDUSTRIAL CONTROL COMPANIES.
- 17 USED IN THESE OPERATIONS TO REGAIN CONTROL IN THE EVENT PRIMARY METHODS (STOLEN CREDENTIALS) ARE COMPROMISED.
- 18 BORING!
- 19 SEE YOU MONDAY!